Analysis

  • max time kernel
    151s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    28-04-2021 14:37

General

  • Target

    d69e7465ee7a39d7149d5150b79c8403.exe

  • Size

    314KB

  • MD5

    d69e7465ee7a39d7149d5150b79c8403

  • SHA1

    e8f7af0707f03e076e62c4936843a60695c1dc26

  • SHA256

    3402ccadc0caee011653d08f4c1da3c2c55fa27f0960e0e1ae83a30dda9dc472

  • SHA512

    f9678c1778f3a0b393f233e1f2ac48f05c170088598857fa863151e369e912e3b17c2c6a6d5edff9c8e56e648973cc15649117cb528e7bbd1876e5a88b0e091e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d69e7465ee7a39d7149d5150b79c8403.exe
    "C:\Users\Admin\AppData\Local\Temp\d69e7465ee7a39d7149d5150b79c8403.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/740-59-0x00000000003D0000-0x0000000000400000-memory.dmp
    Filesize

    192KB

  • memory/740-60-0x0000000000400000-0x00000000004BB000-memory.dmp
    Filesize

    748KB

  • memory/740-61-0x00000000048A1000-0x00000000048A2000-memory.dmp
    Filesize

    4KB

  • memory/740-62-0x0000000001F40000-0x0000000001F5E000-memory.dmp
    Filesize

    120KB

  • memory/740-63-0x00000000048A2000-0x00000000048A3000-memory.dmp
    Filesize

    4KB

  • memory/740-64-0x00000000048A3000-0x00000000048A4000-memory.dmp
    Filesize

    4KB

  • memory/740-65-0x00000000020B0000-0x00000000020CD000-memory.dmp
    Filesize

    116KB

  • memory/740-66-0x00000000048A4000-0x00000000048A6000-memory.dmp
    Filesize

    8KB