Analysis
-
max time kernel
153s -
max time network
76s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-09-2021 14:50
Static task
static1
General
-
Target
f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623.exe
-
Size
243KB
-
MD5
d2aab101152e38f070c47e667232d6a3
-
SHA1
2b57ece616241610c71c1a2d74ce1e41990ef822
-
SHA256
f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623
-
SHA512
4a7e3204f4c6ae31db5621d289a9a8129a332f88b5cff823b46ee74191c8d0b1d0a176ce83ebc86fb523553e755b06d3feb328f1d03150b4e402ce9eb1f37408
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/900-116-0x00000000024F0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/900-121-0x0000000005040000-0x000000000505E000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623.exepid process 900 f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623.exedescription pid process Token: SeDebugPrivilege 900 f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623.exe"C:\Users\Admin\AppData\Local\Temp\f2daa6612e2b856c0ae3a5dda95b63a94c41c0e2cda30539249d42c59c235623.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/900-115-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/900-114-0x0000000000560000-0x00000000006AA000-memory.dmpFilesize
1.3MB
-
memory/900-116-0x00000000024F0000-0x000000000250F000-memory.dmpFilesize
124KB
-
memory/900-117-0x0000000004B40000-0x0000000004B41000-memory.dmpFilesize
4KB
-
memory/900-119-0x00000000022F2000-0x00000000022F3000-memory.dmpFilesize
4KB
-
memory/900-118-0x00000000022F0000-0x00000000022F1000-memory.dmpFilesize
4KB
-
memory/900-120-0x00000000022F3000-0x00000000022F4000-memory.dmpFilesize
4KB
-
memory/900-121-0x0000000005040000-0x000000000505E000-memory.dmpFilesize
120KB
-
memory/900-122-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/900-123-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/900-124-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/900-125-0x00000000022F4000-0x00000000022F6000-memory.dmpFilesize
8KB
-
memory/900-126-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/900-127-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB
-
memory/900-128-0x0000000006AE0000-0x0000000006AE1000-memory.dmpFilesize
4KB
-
memory/900-129-0x0000000006CB0000-0x0000000006CB1000-memory.dmpFilesize
4KB
-
memory/900-130-0x0000000007250000-0x0000000007251000-memory.dmpFilesize
4KB
-
memory/900-131-0x00000000075E0000-0x00000000075E1000-memory.dmpFilesize
4KB
-
memory/900-132-0x00000000076E0000-0x00000000076E1000-memory.dmpFilesize
4KB
-
memory/900-133-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB