Analysis
-
max time kernel
130s -
max time network
158s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-07-2021 08:09
Static task
static1
Behavioral task
behavioral1
Sample
mixazed_20210720-025358.exe
Resource
win7v20210410
General
-
Target
mixazed_20210720-025358.exe
-
Size
249KB
-
MD5
fac04f3a9c10b42baecdb798ccc123f8
-
SHA1
94d23a42531e095b561fb8caa9c5adeba6859c70
-
SHA256
eaa07e23d64c098116b22c677fc8423b2d7c782b838ae43a6ca0004d294d4602
-
SHA512
da64c2355d58f14e71b0de42370cd9964fc53c63e8cc286147414696000c2ae9c45787e558a8719ad268d64affa87bb212fe499e7d2c421f66d48704d5d3d897
Malware Config
Extracted
redline
test1
185.215.113.63:23098
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3920-116-0x0000000002660000-0x000000000267B000-memory.dmp family_redline behavioral2/memory/3920-121-0x0000000004F20000-0x0000000004F39000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mixazed_20210720-025358.exepid process 3920 mixazed_20210720-025358.exe 3920 mixazed_20210720-025358.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
mixazed_20210720-025358.exedescription pid process Token: SeDebugPrivilege 3920 mixazed_20210720-025358.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3920-114-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/3920-115-0x0000000000400000-0x00000000008A8000-memory.dmpFilesize
4.7MB
-
memory/3920-116-0x0000000002660000-0x000000000267B000-memory.dmpFilesize
108KB
-
memory/3920-117-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/3920-119-0x0000000004F42000-0x0000000004F43000-memory.dmpFilesize
4KB
-
memory/3920-118-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/3920-120-0x0000000004F43000-0x0000000004F44000-memory.dmpFilesize
4KB
-
memory/3920-121-0x0000000004F20000-0x0000000004F39000-memory.dmpFilesize
100KB
-
memory/3920-122-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/3920-123-0x0000000005AF0000-0x0000000005AF1000-memory.dmpFilesize
4KB
-
memory/3920-124-0x0000000005B10000-0x0000000005B11000-memory.dmpFilesize
4KB
-
memory/3920-125-0x0000000005B70000-0x0000000005B71000-memory.dmpFilesize
4KB
-
memory/3920-126-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/3920-127-0x0000000004F44000-0x0000000004F46000-memory.dmpFilesize
8KB
-
memory/3920-128-0x00000000069E0000-0x00000000069E1000-memory.dmpFilesize
4KB
-
memory/3920-129-0x0000000006BB0000-0x0000000006BB1000-memory.dmpFilesize
4KB
-
memory/3920-130-0x0000000007200000-0x0000000007201000-memory.dmpFilesize
4KB
-
memory/3920-131-0x0000000007550000-0x0000000007551000-memory.dmpFilesize
4KB