Analysis

  • max time kernel
    150s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    27-04-2021 17:43

General

  • Target

    ead33ecd873189028acc0b7b59388328.exe

  • Size

    338KB

  • MD5

    ead33ecd873189028acc0b7b59388328

  • SHA1

    ff981d8f34bc960efa296f78844d715fd4160c36

  • SHA256

    6695e944178fda99b834ad240fe884d9efda254a3fc6e516f6efee0d4c1c3627

  • SHA512

    3bd03f0b9be5f5f19c8ee3e48af00646cf35aaf84bc6284a5d8634122620b49704e52c78d4c1870cfb95ddab0e1ad9be69dd856c3e6bd32b8e48ac32b100ed39

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead33ecd873189028acc0b7b59388328.exe
    "C:\Users\Admin\AppData\Local\Temp\ead33ecd873189028acc0b7b59388328.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1632-60-0x0000000000230000-0x0000000000260000-memory.dmp
    Filesize

    192KB

  • memory/1632-61-0x00000000003E0000-0x00000000003FE000-memory.dmp
    Filesize

    120KB

  • memory/1632-62-0x0000000003EA0000-0x0000000003EBD000-memory.dmp
    Filesize

    116KB

  • memory/1632-63-0x0000000000400000-0x0000000003DB6000-memory.dmp
    Filesize

    57.7MB

  • memory/1632-65-0x0000000008262000-0x0000000008263000-memory.dmp
    Filesize

    4KB

  • memory/1632-64-0x0000000008261000-0x0000000008262000-memory.dmp
    Filesize

    4KB

  • memory/1632-66-0x0000000008263000-0x0000000008264000-memory.dmp
    Filesize

    4KB

  • memory/1632-67-0x0000000008264000-0x0000000008266000-memory.dmp
    Filesize

    8KB