Analysis
-
max time kernel
16s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-07-2021 23:04
Static task
static1
Behavioral task
behavioral1
Sample
2828e87a24cde9ffa4d318a0a98fab8b.exe
Resource
win7v20210408
General
-
Target
2828e87a24cde9ffa4d318a0a98fab8b.exe
-
Size
395KB
-
MD5
2828e87a24cde9ffa4d318a0a98fab8b
-
SHA1
b8e22b39aebeb2724ce7f8d2edcfcdbe07bbf908
-
SHA256
b30c723982534b09ac7736e33151c7093403b96e8cbc0c9aa58bd7cfcb6a7e32
-
SHA512
d8cd026bbb4f218f8d3d44a139cf36e8052120980a7bae2e9ffbd0a24697de658d19889c9335f0aae812a0af75c993c7e2456e7a3efd8fb0cd77e392f2e3ecf1
Malware Config
Extracted
redline
MIX 26.07
185.215.113.17:18597
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/500-116-0x0000000002610000-0x000000000262B000-memory.dmp family_redline behavioral2/memory/500-118-0x0000000002690000-0x00000000026AA000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2828e87a24cde9ffa4d318a0a98fab8b.exepid process 500 2828e87a24cde9ffa4d318a0a98fab8b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2828e87a24cde9ffa4d318a0a98fab8b.exedescription pid process Token: SeDebugPrivilege 500 2828e87a24cde9ffa4d318a0a98fab8b.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/500-114-0x0000000000480000-0x00000000005CA000-memory.dmpFilesize
1.3MB
-
memory/500-115-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/500-116-0x0000000002610000-0x000000000262B000-memory.dmpFilesize
108KB
-
memory/500-117-0x0000000004BD0000-0x0000000004BD1000-memory.dmpFilesize
4KB
-
memory/500-118-0x0000000002690000-0x00000000026AA000-memory.dmpFilesize
104KB
-
memory/500-119-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/500-120-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/500-121-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB
-
memory/500-122-0x0000000005740000-0x0000000005741000-memory.dmpFilesize
4KB
-
memory/500-124-0x0000000004BC2000-0x0000000004BC3000-memory.dmpFilesize
4KB
-
memory/500-125-0x0000000004BC3000-0x0000000004BC4000-memory.dmpFilesize
4KB
-
memory/500-123-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/500-126-0x0000000004BC4000-0x0000000004BC6000-memory.dmpFilesize
8KB
-
memory/500-127-0x00000000058D0000-0x00000000058D1000-memory.dmpFilesize
4KB
-
memory/500-128-0x00000000065B0000-0x00000000065B1000-memory.dmpFilesize
4KB
-
memory/500-129-0x0000000006780000-0x0000000006781000-memory.dmpFilesize
4KB
-
memory/500-130-0x0000000006DB0000-0x0000000006DB1000-memory.dmpFilesize
4KB
-
memory/500-131-0x0000000007130000-0x0000000007131000-memory.dmpFilesize
4KB
-
memory/500-132-0x00000000071F0000-0x00000000071F1000-memory.dmpFilesize
4KB
-
memory/500-133-0x0000000007400000-0x0000000007401000-memory.dmpFilesize
4KB