Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-04-2021 11:04
Static task
static1
Behavioral task
behavioral1
Sample
28b3925112c799e27aee4d1e37548fe4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
28b3925112c799e27aee4d1e37548fe4.exe
Resource
win10v20210410
General
-
Target
28b3925112c799e27aee4d1e37548fe4.exe
-
Size
307KB
-
MD5
28b3925112c799e27aee4d1e37548fe4
-
SHA1
6312e0e54aeb1a8d461bbfe2a4ab7c36f53521bf
-
SHA256
aa2bf865618a67a955df17bf8abc93978b9c6f42d6a052446cdb582170032fee
-
SHA512
acf35221dc9df24e2b3de157a428d83084c2bfac126d15470f06197c6ef195bac7d93bf988eabeddaf376eff17cc84c227013c8a74afeb7af7c59cf499896221
Malware Config
Extracted
redline
118
bumblebee2021.store:80
trusmileveneers.store:80
lazerprojekt.store:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3232-114-0x0000000004B90000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/3232-116-0x0000000004D40000-0x0000000004D5D000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
28b3925112c799e27aee4d1e37548fe4.exedescription pid process Token: SeDebugPrivilege 3232 28b3925112c799e27aee4d1e37548fe4.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3232-114-0x0000000004B90000-0x0000000004BAE000-memory.dmpFilesize
120KB
-
memory/3232-115-0x0000000007450000-0x0000000007451000-memory.dmpFilesize
4KB
-
memory/3232-116-0x0000000004D40000-0x0000000004D5D000-memory.dmpFilesize
116KB
-
memory/3232-117-0x0000000007950000-0x0000000007951000-memory.dmpFilesize
4KB
-
memory/3232-118-0x00000000072F0000-0x00000000072F1000-memory.dmpFilesize
4KB
-
memory/3232-119-0x0000000007310000-0x0000000007311000-memory.dmpFilesize
4KB
-
memory/3232-120-0x0000000002BC0000-0x0000000002C6E000-memory.dmpFilesize
696KB
-
memory/3232-122-0x0000000007370000-0x0000000007371000-memory.dmpFilesize
4KB
-
memory/3232-121-0x0000000000400000-0x0000000002BBD000-memory.dmpFilesize
39.7MB
-
memory/3232-123-0x0000000007444000-0x0000000007446000-memory.dmpFilesize
8KB
-
memory/3232-125-0x0000000007442000-0x0000000007443000-memory.dmpFilesize
4KB
-
memory/3232-124-0x0000000007440000-0x0000000007441000-memory.dmpFilesize
4KB
-
memory/3232-126-0x0000000007443000-0x0000000007444000-memory.dmpFilesize
4KB
-
memory/3232-127-0x0000000008020000-0x0000000008021000-memory.dmpFilesize
4KB