Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
29-04-2021 13:02
Static task
static1
Behavioral task
behavioral1
Sample
85a54665ced92ed81988e9665f3e0c4c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
85a54665ced92ed81988e9665f3e0c4c.exe
Resource
win10v20210410
General
-
Target
85a54665ced92ed81988e9665f3e0c4c.exe
-
Size
271KB
-
MD5
85a54665ced92ed81988e9665f3e0c4c
-
SHA1
745f4cd9e0ced0c1ef6df9c33ff30d9015b4335e
-
SHA256
f55ddd52c5333d7c9c516b8cf6e0f590ecfecf2419c18c3bc17eec2cf16ede7c
-
SHA512
f94926357a907efc662199a566b2faa29a87fd2e6dfb73a5e86be5014ccb8a981b09dbbe2a22e2ef1d84dceff5f6f658036f001ecbb201bbeb7521cd2133aece
Malware Config
Extracted
redline
118
bumblebee2021.store:80
trusmileveneers.store:80
lazerprojekt.store:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3968-114-0x0000000002370000-0x000000000238E000-memory.dmp family_redline behavioral2/memory/3968-116-0x00000000024A0000-0x00000000024BD000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
85a54665ced92ed81988e9665f3e0c4c.exedescription pid process Token: SeDebugPrivilege 3968 85a54665ced92ed81988e9665f3e0c4c.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3968-114-0x0000000002370000-0x000000000238E000-memory.dmpFilesize
120KB
-
memory/3968-115-0x0000000004C10000-0x0000000004C11000-memory.dmpFilesize
4KB
-
memory/3968-116-0x00000000024A0000-0x00000000024BD000-memory.dmpFilesize
116KB
-
memory/3968-117-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/3968-118-0x0000000002840000-0x0000000002841000-memory.dmpFilesize
4KB
-
memory/3968-119-0x0000000002860000-0x0000000002861000-memory.dmpFilesize
4KB
-
memory/3968-120-0x0000000000460000-0x000000000050E000-memory.dmpFilesize
696KB
-
memory/3968-122-0x00000000028A4000-0x00000000028A6000-memory.dmpFilesize
8KB
-
memory/3968-121-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/3968-123-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/3968-124-0x00000000028A2000-0x00000000028A3000-memory.dmpFilesize
4KB
-
memory/3968-125-0x00000000028A3000-0x00000000028A4000-memory.dmpFilesize
4KB
-
memory/3968-126-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/3968-127-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB