Analysis

  • max time kernel
    62s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    16-06-2021 18:16

General

  • Target

    6462eba261b9c027a27585228da42963.exe

  • Size

    384KB

  • MD5

    6462eba261b9c027a27585228da42963

  • SHA1

    e40ec07f6ed0f1ba8839fb22db651837d7cb8a75

  • SHA256

    7130256274f84aee008d5b6c25676b0319173a0ac2c59fb820569b6d3d037742

  • SHA512

    955884e3f678bd2f2f7805c5845dd14e2d80da55af74ca2e102f6dbc19c52e89f30dfcaba80c3772e8034a5d9bebcb045b00b1bd439676f59f5b4e160b3f6f59

Malware Config

Extracted

Family

redline

Botnet

S01

C2

pupdatastart.tech:80

pupdatastart.xyz:80

pupdatastar.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6462eba261b9c027a27585228da42963.exe
    "C:\Users\Admin\AppData\Local\Temp\6462eba261b9c027a27585228da42963.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2044-60-0x0000000000400000-0x00000000008FE000-memory.dmp

    Filesize

    5.0MB

  • memory/2044-59-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/2044-61-0x00000000009E0000-0x00000000009FB000-memory.dmp

    Filesize

    108KB

  • memory/2044-62-0x00000000024C0000-0x00000000024D9000-memory.dmp

    Filesize

    100KB

  • memory/2044-66-0x0000000004E44000-0x0000000004E46000-memory.dmp

    Filesize

    8KB

  • memory/2044-65-0x0000000004E43000-0x0000000004E44000-memory.dmp

    Filesize

    4KB

  • memory/2044-64-0x0000000004E42000-0x0000000004E43000-memory.dmp

    Filesize

    4KB

  • memory/2044-63-0x0000000004E41000-0x0000000004E42000-memory.dmp

    Filesize

    4KB