Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-04-2021 05:45
Static task
static1
Behavioral task
behavioral1
Sample
fd5149a080f7ea1115f391843c692262.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
fd5149a080f7ea1115f391843c692262.exe
Resource
win10v20210408
General
-
Target
fd5149a080f7ea1115f391843c692262.exe
-
Size
412KB
-
MD5
fd5149a080f7ea1115f391843c692262
-
SHA1
b32da1c27018ecd77b9bfe8705eb9a0c1cf5bce5
-
SHA256
5ad8c577246cf6b0b4e441a43921889d5a5ddc5e75791241eec78f6065f6734a
-
SHA512
b32e03e7c13b2d0b7d36ee73eeca350c2a163c4b8c64ea945576bce6bc95b843913a2b2568c733a55971380f3788661926a7c82bed38811a224dc22716ee4fd4
Malware Config
Extracted
redline
118
bumblebee2021.store:80
trusmileveneers.store:80
lazerprojekt.store:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/796-116-0x00000000028D0000-0x00000000028EE000-memory.dmp family_redline behavioral2/memory/796-119-0x0000000002970000-0x000000000298D000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fd5149a080f7ea1115f391843c692262.exedescription pid process Token: SeDebugPrivilege 796 fd5149a080f7ea1115f391843c692262.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/796-114-0x00000000025B0000-0x00000000025E0000-memory.dmpFilesize
192KB
-
memory/796-115-0x0000000000400000-0x000000000085D000-memory.dmpFilesize
4.4MB
-
memory/796-116-0x00000000028D0000-0x00000000028EE000-memory.dmpFilesize
120KB
-
memory/796-117-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/796-118-0x00000000051F0000-0x00000000051F1000-memory.dmpFilesize
4KB
-
memory/796-119-0x0000000002970000-0x000000000298D000-memory.dmpFilesize
116KB
-
memory/796-120-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/796-121-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/796-122-0x00000000051E2000-0x00000000051E3000-memory.dmpFilesize
4KB
-
memory/796-123-0x00000000051E3000-0x00000000051E4000-memory.dmpFilesize
4KB
-
memory/796-124-0x0000000002A60000-0x0000000002A61000-memory.dmpFilesize
4KB
-
memory/796-125-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/796-126-0x00000000051E4000-0x00000000051E6000-memory.dmpFilesize
8KB
-
memory/796-127-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB