Analysis

  • max time kernel
    26s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16-06-2021 14:45

General

  • Target

    5e51ff771292d383b9942ee310a0df1c.exe

  • Size

    389KB

  • MD5

    5e51ff771292d383b9942ee310a0df1c

  • SHA1

    7bfc60c43aa71cb52ec9d09f59c1f28ae784658f

  • SHA256

    532ad0ae1e8256d6a9bb94dae853f8cae2d497999070d4d1e26a39e046032548

  • SHA512

    f972a31249ead48954055c5687371c441edf9786a03ee76c93b57c9f5e737d84f74a91f8dfb90a306ef5f388424c9436097e28edd41b5f8eb0fd1cf921176884

Malware Config

Extracted

Family

redline

Botnet

16.06

C2

185.215.113.15:61506

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e51ff771292d383b9942ee310a0df1c.exe
    "C:\Users\Admin\AppData\Local\Temp\5e51ff771292d383b9942ee310a0df1c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:488

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/488-114-0x0000000003360000-0x000000000338F000-memory.dmp
    Filesize

    188KB

  • memory/488-115-0x00000000050F0000-0x000000000510A000-memory.dmp
    Filesize

    104KB

  • memory/488-117-0x0000000007990000-0x0000000007991000-memory.dmp
    Filesize

    4KB

  • memory/488-116-0x0000000000400000-0x000000000324E000-memory.dmp
    Filesize

    46.3MB

  • memory/488-118-0x0000000005192000-0x0000000005193000-memory.dmp
    Filesize

    4KB

  • memory/488-120-0x0000000005193000-0x0000000005194000-memory.dmp
    Filesize

    4KB

  • memory/488-119-0x0000000005190000-0x0000000005191000-memory.dmp
    Filesize

    4KB

  • memory/488-121-0x00000000052C0000-0x00000000052D9000-memory.dmp
    Filesize

    100KB

  • memory/488-122-0x0000000007E90000-0x0000000007E91000-memory.dmp
    Filesize

    4KB

  • memory/488-123-0x0000000005194000-0x0000000005196000-memory.dmp
    Filesize

    8KB

  • memory/488-124-0x00000000084A0000-0x00000000084A1000-memory.dmp
    Filesize

    4KB

  • memory/488-125-0x00000000084C0000-0x00000000084C1000-memory.dmp
    Filesize

    4KB

  • memory/488-126-0x0000000008510000-0x0000000008511000-memory.dmp
    Filesize

    4KB

  • memory/488-127-0x00000000086A0000-0x00000000086A1000-memory.dmp
    Filesize

    4KB

  • memory/488-128-0x0000000009380000-0x0000000009381000-memory.dmp
    Filesize

    4KB

  • memory/488-129-0x0000000009550000-0x0000000009551000-memory.dmp
    Filesize

    4KB

  • memory/488-130-0x0000000009BA0000-0x0000000009BA1000-memory.dmp
    Filesize

    4KB

  • memory/488-131-0x0000000009FF0000-0x0000000009FF1000-memory.dmp
    Filesize

    4KB