Analysis

  • max time kernel
    18s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    16-06-2021 18:16

General

  • Target

    6462eba261b9c027a27585228da42963.exe

  • Size

    384KB

  • MD5

    6462eba261b9c027a27585228da42963

  • SHA1

    e40ec07f6ed0f1ba8839fb22db651837d7cb8a75

  • SHA256

    7130256274f84aee008d5b6c25676b0319173a0ac2c59fb820569b6d3d037742

  • SHA512

    955884e3f678bd2f2f7805c5845dd14e2d80da55af74ca2e102f6dbc19c52e89f30dfcaba80c3772e8034a5d9bebcb045b00b1bd439676f59f5b4e160b3f6f59

Malware Config

Extracted

Family

redline

Botnet

S01

C2

pupdatastart.tech:80

pupdatastart.xyz:80

pupdatastar.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6462eba261b9c027a27585228da42963.exe
    "C:\Users\Admin\AppData\Local\Temp\6462eba261b9c027a27585228da42963.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4044-114-0x0000000002670000-0x000000000268B000-memory.dmp

    Filesize

    108KB

  • memory/4044-115-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

    Filesize

    4KB

  • memory/4044-116-0x00000000026E0000-0x00000000026F9000-memory.dmp

    Filesize

    100KB

  • memory/4044-117-0x00000000053D0000-0x00000000053D1000-memory.dmp

    Filesize

    4KB

  • memory/4044-118-0x0000000005A00000-0x0000000005A01000-memory.dmp

    Filesize

    4KB

  • memory/4044-119-0x0000000005A30000-0x0000000005A31000-memory.dmp

    Filesize

    4KB

  • memory/4044-120-0x0000000005A80000-0x0000000005A81000-memory.dmp

    Filesize

    4KB

  • memory/4044-121-0x0000000000900000-0x0000000000A4A000-memory.dmp

    Filesize

    1.3MB

  • memory/4044-122-0x0000000000400000-0x00000000008FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4044-123-0x00000000025C0000-0x00000000025C1000-memory.dmp

    Filesize

    4KB

  • memory/4044-125-0x00000000025C3000-0x00000000025C4000-memory.dmp

    Filesize

    4KB

  • memory/4044-124-0x00000000025C2000-0x00000000025C3000-memory.dmp

    Filesize

    4KB

  • memory/4044-126-0x00000000025C4000-0x00000000025C6000-memory.dmp

    Filesize

    8KB

  • memory/4044-127-0x0000000005C10000-0x0000000005C11000-memory.dmp

    Filesize

    4KB

  • memory/4044-128-0x00000000068F0000-0x00000000068F1000-memory.dmp

    Filesize

    4KB

  • memory/4044-129-0x0000000006AC0000-0x0000000006AC1000-memory.dmp

    Filesize

    4KB

  • memory/4044-130-0x00000000070F0000-0x00000000070F1000-memory.dmp

    Filesize

    4KB

  • memory/4044-131-0x0000000007590000-0x0000000007591000-memory.dmp

    Filesize

    4KB