Analysis

  • max time kernel
    107s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    07-05-2021 19:02

General

  • Target

    1a51248c75d910c49f184342a912fe9cb7ace5d8.exe

  • Size

    136KB

  • MD5

    7eaf6cacffb2ae2b3c3b6c2b0491e2a5

  • SHA1

    1a51248c75d910c49f184342a912fe9cb7ace5d8

  • SHA256

    6308b2097dcba28565037a65fd9354fe7cecc13df2b7459ef91153760fa8dc42

  • SHA512

    1bd52476a59e05e6ec5de3dc4cf7705cea37668fc8b3d143f269123cb32a582f493ffa093c3fe2d6c647d1ccef31de51c922cf48eb6f96f87c99e3aebc3d6731

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a51248c75d910c49f184342a912fe9cb7ace5d8.exe
    "C:\Users\Admin\AppData\Local\Temp\1a51248c75d910c49f184342a912fe9cb7ace5d8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2988

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/624-114-0x0000000000920000-0x0000000000921000-memory.dmp
    Filesize

    4KB

  • memory/624-116-0x00000000051A0000-0x00000000051A1000-memory.dmp
    Filesize

    4KB

  • memory/624-117-0x0000000001140000-0x0000000001142000-memory.dmp
    Filesize

    8KB

  • memory/2988-118-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/2988-119-0x00000000004163C2-mapping.dmp
  • memory/2988-122-0x0000000005A30000-0x0000000005A31000-memory.dmp
    Filesize

    4KB

  • memory/2988-123-0x0000000005420000-0x0000000005421000-memory.dmp
    Filesize

    4KB

  • memory/2988-124-0x0000000005480000-0x0000000005481000-memory.dmp
    Filesize

    4KB

  • memory/2988-125-0x00000000054C0000-0x00000000054C1000-memory.dmp
    Filesize

    4KB

  • memory/2988-126-0x0000000005420000-0x0000000005A26000-memory.dmp
    Filesize

    6.0MB

  • memory/2988-127-0x0000000005730000-0x0000000005731000-memory.dmp
    Filesize

    4KB

  • memory/2988-128-0x00000000062E0000-0x00000000062E1000-memory.dmp
    Filesize

    4KB

  • memory/2988-129-0x0000000006880000-0x0000000006881000-memory.dmp
    Filesize

    4KB

  • memory/2988-130-0x0000000006D80000-0x0000000006D81000-memory.dmp
    Filesize

    4KB

  • memory/2988-131-0x0000000007480000-0x0000000007481000-memory.dmp
    Filesize

    4KB

  • memory/2988-132-0x00000000067F0000-0x00000000067F1000-memory.dmp
    Filesize

    4KB