Analysis
-
max time kernel
24s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-07-2021 09:01
Static task
static1
Behavioral task
behavioral1
Sample
25b64c0bad59caa2bb89de749ce69e2b.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
25b64c0bad59caa2bb89de749ce69e2b.exe
Resource
win10v20210410
General
-
Target
25b64c0bad59caa2bb89de749ce69e2b.exe
-
Size
387KB
-
MD5
25b64c0bad59caa2bb89de749ce69e2b
-
SHA1
26bd53222cdce89e0ab183db7fa9df6dd489982b
-
SHA256
0c16b313253259d25a77c5019df1985e6c356c56f4ce19f8119829efec7db43d
-
SHA512
930569743201567d74d32e34361ad13b801c6ef492543d805a1ba1553a4aa037738214e4b8e3546a69187b72478072c78ee526e77ebb77d1113e463ea6e0e173
Malware Config
Extracted
redline
193.56.146.60:51431
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1696-114-0x00000000022F0000-0x000000000230B000-memory.dmp family_redline behavioral2/memory/1696-116-0x00000000023B0000-0x00000000023CA000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
25b64c0bad59caa2bb89de749ce69e2b.exepid process 1696 25b64c0bad59caa2bb89de749ce69e2b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
25b64c0bad59caa2bb89de749ce69e2b.exedescription pid process Token: SeDebugPrivilege 1696 25b64c0bad59caa2bb89de749ce69e2b.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1696-114-0x00000000022F0000-0x000000000230B000-memory.dmpFilesize
108KB
-
memory/1696-115-0x0000000004AE0000-0x0000000004AE1000-memory.dmpFilesize
4KB
-
memory/1696-116-0x00000000023B0000-0x00000000023CA000-memory.dmpFilesize
104KB
-
memory/1696-117-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/1696-118-0x0000000004A60000-0x0000000004A61000-memory.dmpFilesize
4KB
-
memory/1696-119-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/1696-121-0x0000000000400000-0x000000000047C000-memory.dmpFilesize
496KB
-
memory/1696-120-0x00000000005F0000-0x000000000061F000-memory.dmpFilesize
188KB
-
memory/1696-122-0x0000000004AD0000-0x0000000004AD1000-memory.dmpFilesize
4KB
-
memory/1696-123-0x0000000004AD2000-0x0000000004AD3000-memory.dmpFilesize
4KB
-
memory/1696-124-0x0000000004AD3000-0x0000000004AD4000-memory.dmpFilesize
4KB
-
memory/1696-125-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/1696-126-0x0000000005790000-0x0000000005791000-memory.dmpFilesize
4KB
-
memory/1696-127-0x0000000004AD4000-0x0000000004AD6000-memory.dmpFilesize
8KB
-
memory/1696-128-0x0000000006470000-0x0000000006471000-memory.dmpFilesize
4KB
-
memory/1696-129-0x0000000006640000-0x0000000006641000-memory.dmpFilesize
4KB
-
memory/1696-130-0x0000000006C70000-0x0000000006C71000-memory.dmpFilesize
4KB
-
memory/1696-131-0x0000000006D30000-0x0000000006D31000-memory.dmpFilesize
4KB
-
memory/1696-132-0x0000000006E40000-0x0000000006E41000-memory.dmpFilesize
4KB
-
memory/1696-133-0x0000000007000000-0x0000000007001000-memory.dmpFilesize
4KB