Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-04-2021 12:02

General

  • Target

    9912ba933918d4b6049652e42804aeab.exe

  • Size

    316KB

  • MD5

    9912ba933918d4b6049652e42804aeab

  • SHA1

    0c93792ee245ef911fe437b66380894d5cac8cca

  • SHA256

    4c8d1a1d118384df23575d4421f573f9b97d984b295083b329a8ee08709dcfce

  • SHA512

    17cf13f13464c5d31ec3555d659415c48612d498073dab22388bb787a8348d9e3cbba94a7ff0e43005525e28bfc44138a770c4a9ced0bb8e7fb5c7f003af26e0

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9912ba933918d4b6049652e42804aeab.exe
    "C:\Users\Admin\AppData\Local\Temp\9912ba933918d4b6049652e42804aeab.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4800

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4800-115-0x0000000000400000-0x00000000004BC000-memory.dmp
    Filesize

    752KB

  • memory/4800-114-0x0000000002100000-0x0000000002130000-memory.dmp
    Filesize

    192KB

  • memory/4800-116-0x0000000002180000-0x000000000219E000-memory.dmp
    Filesize

    120KB

  • memory/4800-117-0x0000000004CA0000-0x0000000004CA1000-memory.dmp
    Filesize

    4KB

  • memory/4800-118-0x00000000024A0000-0x00000000024BD000-memory.dmp
    Filesize

    116KB

  • memory/4800-119-0x00000000051A0000-0x00000000051A1000-memory.dmp
    Filesize

    4KB

  • memory/4800-121-0x0000000004C92000-0x0000000004C93000-memory.dmp
    Filesize

    4KB

  • memory/4800-120-0x0000000004C90000-0x0000000004C91000-memory.dmp
    Filesize

    4KB

  • memory/4800-122-0x0000000004C93000-0x0000000004C94000-memory.dmp
    Filesize

    4KB

  • memory/4800-123-0x0000000002550000-0x0000000002551000-memory.dmp
    Filesize

    4KB

  • memory/4800-124-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
    Filesize

    4KB

  • memory/4800-125-0x0000000004C94000-0x0000000004C96000-memory.dmp
    Filesize

    8KB

  • memory/4800-126-0x0000000004B30000-0x0000000004B31000-memory.dmp
    Filesize

    4KB

  • memory/4800-127-0x00000000057E0000-0x00000000057E1000-memory.dmp
    Filesize

    4KB