Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-04-2021 18:02

General

  • Target

    ead33ecd873189028acc0b7b59388328.exe

  • Size

    338KB

  • MD5

    ead33ecd873189028acc0b7b59388328

  • SHA1

    ff981d8f34bc960efa296f78844d715fd4160c36

  • SHA256

    6695e944178fda99b834ad240fe884d9efda254a3fc6e516f6efee0d4c1c3627

  • SHA512

    3bd03f0b9be5f5f19c8ee3e48af00646cf35aaf84bc6284a5d8634122620b49704e52c78d4c1870cfb95ddab0e1ad9be69dd856c3e6bd32b8e48ac32b100ed39

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead33ecd873189028acc0b7b59388328.exe
    "C:\Users\Admin\AppData\Local\Temp\ead33ecd873189028acc0b7b59388328.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/656-114-0x00000000001D0000-0x0000000000200000-memory.dmp
    Filesize

    192KB

  • memory/656-115-0x0000000000400000-0x0000000003DB6000-memory.dmp
    Filesize

    57.7MB

  • memory/656-116-0x0000000005DF0000-0x0000000005E0E000-memory.dmp
    Filesize

    120KB

  • memory/656-117-0x00000000085B0000-0x00000000085B1000-memory.dmp
    Filesize

    4KB

  • memory/656-118-0x00000000085A0000-0x00000000085A1000-memory.dmp
    Filesize

    4KB

  • memory/656-119-0x00000000085A2000-0x00000000085A3000-memory.dmp
    Filesize

    4KB

  • memory/656-120-0x00000000085A3000-0x00000000085A4000-memory.dmp
    Filesize

    4KB

  • memory/656-121-0x0000000005E90000-0x0000000005EAD000-memory.dmp
    Filesize

    116KB

  • memory/656-122-0x0000000008AB0000-0x0000000008AB1000-memory.dmp
    Filesize

    4KB

  • memory/656-123-0x0000000006060000-0x0000000006061000-memory.dmp
    Filesize

    4KB

  • memory/656-124-0x00000000083E0000-0x00000000083E1000-memory.dmp
    Filesize

    4KB

  • memory/656-125-0x0000000008430000-0x0000000008431000-memory.dmp
    Filesize

    4KB

  • memory/656-126-0x00000000085A4000-0x00000000085A6000-memory.dmp
    Filesize

    8KB

  • memory/656-127-0x00000000090E0000-0x00000000090E1000-memory.dmp
    Filesize

    4KB