Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    05-05-2021 11:32

General

  • Target

    XORLo47xgeBB82g5D6rM.exe

  • Size

    995KB

  • MD5

    a4f61bad23090fdec0a408d6fce7a4aa

  • SHA1

    e183b9fda5c7a9e4ddd98d9cf93b5aab4670aae7

  • SHA256

    1efeb065915f4f4dc1a53837ef5f428b4c73d27fb30086ccb8d792d2f68295a4

  • SHA512

    1d1eab8c1764a73bb5279606b141f6ffe890e0272f3b2e7f2f82c4da0c471e489f0a546d5dce6debf86b5f2a00861fb9d53127b92a01b4462f9e2c5f82bfb091

Malware Config

Extracted

Family

redline

Botnet

2.05.111M

C2

redworksite.info:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XORLo47xgeBB82g5D6rM.exe
    "C:\Users\Admin\AppData\Local\Temp\XORLo47xgeBB82g5D6rM.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\XORLo47xgeBB82g5D6rM.exe
      "{path}"
      2⤵
        PID:1684
      • C:\Users\Admin\AppData\Local\Temp\XORLo47xgeBB82g5D6rM.exe
        "{path}"
        2⤵
          PID:2124
        • C:\Users\Admin\AppData\Local\Temp\XORLo47xgeBB82g5D6rM.exe
          "{path}"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3948

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XORLo47xgeBB82g5D6rM.exe.log
        MD5

        b4f7a6a57cb46d94b72410eb6a6d45a9

        SHA1

        69f3596ffa027202d391444b769ceea0ae14c5f7

        SHA256

        23994ebe221a48ea16ebad51ae0d4b47ccd415ae10581f9405e588d4f6c2523b

        SHA512

        be6da516e54c3a5b33ac2603137a2f8cf8445ff5961dd266faedf3627bae8979953d7ef305538df0151c609917a5b99bf5d023bdd32de50fd5c723950f90db5c

      • memory/1808-125-0x0000000008BB0000-0x0000000008BE0000-memory.dmp
        Filesize

        192KB

      • memory/1808-118-0x00000000052B0000-0x00000000052B1000-memory.dmp
        Filesize

        4KB

      • memory/1808-124-0x00000000089F0000-0x0000000008A6C000-memory.dmp
        Filesize

        496KB

      • memory/1808-119-0x00000000088A0000-0x00000000088A1000-memory.dmp
        Filesize

        4KB

      • memory/1808-120-0x0000000008940000-0x00000000089D1000-memory.dmp
        Filesize

        580KB

      • memory/1808-121-0x0000000005310000-0x0000000005311000-memory.dmp
        Filesize

        4KB

      • memory/1808-122-0x0000000005170000-0x0000000005171000-memory.dmp
        Filesize

        4KB

      • memory/1808-123-0x0000000005800000-0x000000000580E000-memory.dmp
        Filesize

        56KB

      • memory/1808-116-0x0000000005820000-0x0000000005821000-memory.dmp
        Filesize

        4KB

      • memory/1808-114-0x0000000000920000-0x0000000000921000-memory.dmp
        Filesize

        4KB

      • memory/1808-117-0x0000000005320000-0x0000000005321000-memory.dmp
        Filesize

        4KB

      • memory/3948-141-0x0000000006E80000-0x0000000006E81000-memory.dmp
        Filesize

        4KB

      • memory/3948-127-0x00000000004163A2-mapping.dmp
      • memory/3948-131-0x0000000005660000-0x0000000005661000-memory.dmp
        Filesize

        4KB

      • memory/3948-132-0x0000000005100000-0x0000000005101000-memory.dmp
        Filesize

        4KB

      • memory/3948-133-0x0000000005160000-0x0000000005161000-memory.dmp
        Filesize

        4KB

      • memory/3948-134-0x00000000051A0000-0x00000000051A1000-memory.dmp
        Filesize

        4KB

      • memory/3948-135-0x0000000005410000-0x0000000005411000-memory.dmp
        Filesize

        4KB

      • memory/3948-136-0x0000000005050000-0x0000000005656000-memory.dmp
        Filesize

        6.0MB

      • memory/3948-139-0x0000000006CB0000-0x0000000006CB1000-memory.dmp
        Filesize

        4KB

      • memory/3948-140-0x00000000073B0000-0x00000000073B1000-memory.dmp
        Filesize

        4KB

      • memory/3948-126-0x0000000000400000-0x000000000041C000-memory.dmp
        Filesize

        112KB