Analysis

  • max time kernel
    149s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-04-2021 16:41

General

  • Target

    986ca72a202a2eeb156c26f24307201a.exe

  • Size

    308KB

  • MD5

    986ca72a202a2eeb156c26f24307201a

  • SHA1

    3a9151b4d8eae53ea43f37f26604550f6619cd74

  • SHA256

    9caca6be74c24e84786b067815cea66910ef7df3a8743386a5cc0ca6d98b49b2

  • SHA512

    5cf2a6aa2827bbbefb46959779e357c10289e8ee5183914d857bd2044c3e8cf21584fbce49306f1553073458012ca563a4f7b2a22bd0bd446df1a8cd2517bb12

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\986ca72a202a2eeb156c26f24307201a.exe
    "C:\Users\Admin\AppData\Local\Temp\986ca72a202a2eeb156c26f24307201a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-60-0x0000000002BC0000-0x0000000002BDE000-memory.dmp
    Filesize

    120KB

  • memory/1084-61-0x0000000000230000-0x0000000000260000-memory.dmp
    Filesize

    192KB

  • memory/1084-63-0x0000000006EB1000-0x0000000006EB2000-memory.dmp
    Filesize

    4KB

  • memory/1084-64-0x0000000006EB2000-0x0000000006EB3000-memory.dmp
    Filesize

    4KB

  • memory/1084-62-0x0000000000400000-0x0000000002BC0000-memory.dmp
    Filesize

    39.8MB

  • memory/1084-65-0x0000000006EB3000-0x0000000006EB4000-memory.dmp
    Filesize

    4KB

  • memory/1084-66-0x0000000002C40000-0x0000000002C5D000-memory.dmp
    Filesize

    116KB

  • memory/1084-67-0x0000000006EB4000-0x0000000006EB6000-memory.dmp
    Filesize

    8KB