Resubmissions

07-05-2021 18:56

210507-2v7r2kd3q2 10

Analysis

  • max time kernel
    24s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    07-05-2021 18:56

General

  • Target

    1a51248c75d910c49f184342a912fe9cb7ace5d8.exe

  • Size

    136KB

  • MD5

    7eaf6cacffb2ae2b3c3b6c2b0491e2a5

  • SHA1

    1a51248c75d910c49f184342a912fe9cb7ace5d8

  • SHA256

    6308b2097dcba28565037a65fd9354fe7cecc13df2b7459ef91153760fa8dc42

  • SHA512

    1bd52476a59e05e6ec5de3dc4cf7705cea37668fc8b3d143f269123cb32a582f493ffa093c3fe2d6c647d1ccef31de51c922cf48eb6f96f87c99e3aebc3d6731

Malware Config

Extracted

Family

redline

Botnet

lyla

C2

87.251.71.4:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a51248c75d910c49f184342a912fe9cb7ace5d8.exe
    "C:\Users\Admin\AppData\Local\Temp\1a51248c75d910c49f184342a912fe9cb7ace5d8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4008-125-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

    Filesize

    4KB

  • memory/4008-127-0x0000000004F80000-0x0000000004F81000-memory.dmp

    Filesize

    4KB

  • memory/4008-132-0x0000000006570000-0x0000000006571000-memory.dmp

    Filesize

    4KB

  • memory/4008-118-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4008-131-0x0000000006E40000-0x0000000006E41000-memory.dmp

    Filesize

    4KB

  • memory/4008-122-0x00000000051E0000-0x00000000051E1000-memory.dmp

    Filesize

    4KB

  • memory/4008-130-0x0000000006740000-0x0000000006741000-memory.dmp

    Filesize

    4KB

  • memory/4008-123-0x0000000004C40000-0x0000000004C41000-memory.dmp

    Filesize

    4KB

  • memory/4008-126-0x0000000004BD0000-0x00000000051D6000-memory.dmp

    Filesize

    6.0MB

  • memory/4008-124-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

    Filesize

    4KB

  • memory/4008-128-0x0000000005AD0000-0x0000000005AD1000-memory.dmp

    Filesize

    4KB

  • memory/4008-129-0x0000000006070000-0x0000000006071000-memory.dmp

    Filesize

    4KB

  • memory/4044-116-0x0000000005090000-0x0000000005091000-memory.dmp

    Filesize

    4KB

  • memory/4044-114-0x00000000008C0000-0x00000000008C1000-memory.dmp

    Filesize

    4KB

  • memory/4044-117-0x0000000002B30000-0x0000000002B32000-memory.dmp

    Filesize

    8KB