Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-04-2021 10:21
Static task
static1
Behavioral task
behavioral1
Sample
28b3925112c799e27aee4d1e37548fe4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
28b3925112c799e27aee4d1e37548fe4.exe
Resource
win10v20210410
General
-
Target
28b3925112c799e27aee4d1e37548fe4.exe
-
Size
307KB
-
MD5
28b3925112c799e27aee4d1e37548fe4
-
SHA1
6312e0e54aeb1a8d461bbfe2a4ab7c36f53521bf
-
SHA256
aa2bf865618a67a955df17bf8abc93978b9c6f42d6a052446cdb582170032fee
-
SHA512
acf35221dc9df24e2b3de157a428d83084c2bfac126d15470f06197c6ef195bac7d93bf988eabeddaf376eff17cc84c227013c8a74afeb7af7c59cf499896221
Malware Config
Extracted
redline
118
bumblebee2021.store:80
trusmileveneers.store:80
lazerprojekt.store:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3680-114-0x00000000049D0000-0x00000000049EE000-memory.dmp family_redline behavioral2/memory/3680-116-0x0000000004B90000-0x0000000004BAD000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
28b3925112c799e27aee4d1e37548fe4.exedescription pid process Token: SeDebugPrivilege 3680 28b3925112c799e27aee4d1e37548fe4.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3680-114-0x00000000049D0000-0x00000000049EE000-memory.dmpFilesize
120KB
-
memory/3680-115-0x00000000072F0000-0x00000000072F1000-memory.dmpFilesize
4KB
-
memory/3680-116-0x0000000004B90000-0x0000000004BAD000-memory.dmpFilesize
116KB
-
memory/3680-117-0x00000000077F0000-0x00000000077F1000-memory.dmpFilesize
4KB
-
memory/3680-118-0x00000000047B0000-0x00000000047E0000-memory.dmpFilesize
192KB
-
memory/3680-120-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/3680-121-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/3680-119-0x0000000000400000-0x0000000002BBD000-memory.dmpFilesize
39.7MB
-
memory/3680-122-0x00000000049F4000-0x00000000049F6000-memory.dmpFilesize
8KB
-
memory/3680-123-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/3680-124-0x00000000049F2000-0x00000000049F3000-memory.dmpFilesize
4KB
-
memory/3680-126-0x00000000049F3000-0x00000000049F4000-memory.dmpFilesize
4KB
-
memory/3680-125-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/3680-127-0x0000000007EE0000-0x0000000007EE1000-memory.dmpFilesize
4KB