Analysis

  • max time kernel
    16s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-07-2021 23:04

General

  • Target

    2828e87a24cde9ffa4d318a0a98fab8b.exe

  • Size

    395KB

  • MD5

    2828e87a24cde9ffa4d318a0a98fab8b

  • SHA1

    b8e22b39aebeb2724ce7f8d2edcfcdbe07bbf908

  • SHA256

    b30c723982534b09ac7736e33151c7093403b96e8cbc0c9aa58bd7cfcb6a7e32

  • SHA512

    d8cd026bbb4f218f8d3d44a139cf36e8052120980a7bae2e9ffbd0a24697de658d19889c9335f0aae812a0af75c993c7e2456e7a3efd8fb0cd77e392f2e3ecf1

Malware Config

Extracted

Family

redline

Botnet

MIX 26.07

C2

185.215.113.17:18597

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2828e87a24cde9ffa4d318a0a98fab8b.exe
    "C:\Users\Admin\AppData\Local\Temp\2828e87a24cde9ffa4d318a0a98fab8b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:500

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/500-114-0x0000000000480000-0x00000000005CA000-memory.dmp
    Filesize

    1.3MB

  • memory/500-115-0x0000000000400000-0x000000000047D000-memory.dmp
    Filesize

    500KB

  • memory/500-116-0x0000000002610000-0x000000000262B000-memory.dmp
    Filesize

    108KB

  • memory/500-117-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
    Filesize

    4KB

  • memory/500-118-0x0000000002690000-0x00000000026AA000-memory.dmp
    Filesize

    104KB

  • memory/500-119-0x00000000050D0000-0x00000000050D1000-memory.dmp
    Filesize

    4KB

  • memory/500-120-0x0000000004BA0000-0x0000000004BA1000-memory.dmp
    Filesize

    4KB

  • memory/500-121-0x00000000056E0000-0x00000000056E1000-memory.dmp
    Filesize

    4KB

  • memory/500-122-0x0000000005740000-0x0000000005741000-memory.dmp
    Filesize

    4KB

  • memory/500-124-0x0000000004BC2000-0x0000000004BC3000-memory.dmp
    Filesize

    4KB

  • memory/500-125-0x0000000004BC3000-0x0000000004BC4000-memory.dmp
    Filesize

    4KB

  • memory/500-123-0x0000000004BC0000-0x0000000004BC1000-memory.dmp
    Filesize

    4KB

  • memory/500-126-0x0000000004BC4000-0x0000000004BC6000-memory.dmp
    Filesize

    8KB

  • memory/500-127-0x00000000058D0000-0x00000000058D1000-memory.dmp
    Filesize

    4KB

  • memory/500-128-0x00000000065B0000-0x00000000065B1000-memory.dmp
    Filesize

    4KB

  • memory/500-129-0x0000000006780000-0x0000000006781000-memory.dmp
    Filesize

    4KB

  • memory/500-130-0x0000000006DB0000-0x0000000006DB1000-memory.dmp
    Filesize

    4KB

  • memory/500-131-0x0000000007130000-0x0000000007131000-memory.dmp
    Filesize

    4KB

  • memory/500-132-0x00000000071F0000-0x00000000071F1000-memory.dmp
    Filesize

    4KB

  • memory/500-133-0x0000000007400000-0x0000000007401000-memory.dmp
    Filesize

    4KB