Analysis

  • max time kernel
    150s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-04-2021 17:03

General

  • Target

    986ca72a202a2eeb156c26f24307201a.exe

  • Size

    308KB

  • MD5

    986ca72a202a2eeb156c26f24307201a

  • SHA1

    3a9151b4d8eae53ea43f37f26604550f6619cd74

  • SHA256

    9caca6be74c24e84786b067815cea66910ef7df3a8743386a5cc0ca6d98b49b2

  • SHA512

    5cf2a6aa2827bbbefb46959779e357c10289e8ee5183914d857bd2044c3e8cf21584fbce49306f1553073458012ca563a4f7b2a22bd0bd446df1a8cd2517bb12

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\986ca72a202a2eeb156c26f24307201a.exe
    "C:\Users\Admin\AppData\Local\Temp\986ca72a202a2eeb156c26f24307201a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1880-59-0x00000000001C0000-0x00000000001F0000-memory.dmp
    Filesize

    192KB

  • memory/1880-60-0x0000000000400000-0x0000000002BC0000-memory.dmp
    Filesize

    39.8MB

  • memory/1880-61-0x0000000002C40000-0x0000000002C5E000-memory.dmp
    Filesize

    120KB

  • memory/1880-62-0x0000000002CD0000-0x0000000002CED000-memory.dmp
    Filesize

    116KB

  • memory/1880-65-0x0000000006F83000-0x0000000006F84000-memory.dmp
    Filesize

    4KB

  • memory/1880-64-0x0000000006F82000-0x0000000006F83000-memory.dmp
    Filesize

    4KB

  • memory/1880-63-0x0000000006F81000-0x0000000006F82000-memory.dmp
    Filesize

    4KB

  • memory/1880-66-0x0000000006F84000-0x0000000006F86000-memory.dmp
    Filesize

    8KB