Analysis
-
max time kernel
83s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
15-10-2021 19:21
Static task
static1
General
-
Target
3f9d3ff3bb81a73a33c1ea3be446188cff9edeaa8e1a63a6741b815e48b05dfa.exe
-
Size
369KB
-
MD5
3b32afee256fd90df34adcd6465af6af
-
SHA1
f9f79d4b4e859e07951a8f254ff84c858c6fdae4
-
SHA256
3f9d3ff3bb81a73a33c1ea3be446188cff9edeaa8e1a63a6741b815e48b05dfa
-
SHA512
e94e47b7aa73232efc67912231126b022f5c6970467d8b329a7ac2337af6cecdd99f18babc953ce3e0dd11b5b1a71317f0cd1ec322b93c8ca4095dab39cc628f
Malware Config
Extracted
redline
PUB
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3556-118-0x0000000003570000-0x000000000358F000-memory.dmp family_redline behavioral1/memory/3556-120-0x00000000037C0000-0x00000000037DD000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3f9d3ff3bb81a73a33c1ea3be446188cff9edeaa8e1a63a6741b815e48b05dfa.exedescription pid process Token: SeDebugPrivilege 3556 3f9d3ff3bb81a73a33c1ea3be446188cff9edeaa8e1a63a6741b815e48b05dfa.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3556-116-0x0000000003400000-0x0000000003430000-memory.dmpFilesize
192KB
-
memory/3556-117-0x0000000000400000-0x00000000016CF000-memory.dmpFilesize
18.8MB
-
memory/3556-118-0x0000000003570000-0x000000000358F000-memory.dmpFilesize
124KB
-
memory/3556-119-0x0000000006110000-0x0000000006111000-memory.dmpFilesize
4KB
-
memory/3556-120-0x00000000037C0000-0x00000000037DD000-memory.dmpFilesize
116KB
-
memory/3556-121-0x0000000006610000-0x0000000006611000-memory.dmpFilesize
4KB
-
memory/3556-122-0x0000000003880000-0x0000000003881000-memory.dmpFilesize
4KB
-
memory/3556-123-0x0000000005F50000-0x0000000005F51000-memory.dmpFilesize
4KB
-
memory/3556-124-0x0000000006100000-0x0000000006101000-memory.dmpFilesize
4KB
-
memory/3556-126-0x0000000006103000-0x0000000006104000-memory.dmpFilesize
4KB
-
memory/3556-125-0x0000000006102000-0x0000000006103000-memory.dmpFilesize
4KB
-
memory/3556-127-0x0000000006104000-0x0000000006106000-memory.dmpFilesize
8KB
-
memory/3556-128-0x00000000038B0000-0x00000000038B1000-memory.dmpFilesize
4KB
-
memory/3556-129-0x0000000003A40000-0x0000000003A41000-memory.dmpFilesize
4KB
-
memory/3556-130-0x0000000007700000-0x0000000007701000-memory.dmpFilesize
4KB
-
memory/3556-131-0x00000000078D0000-0x00000000078D1000-memory.dmpFilesize
4KB
-
memory/3556-132-0x0000000007EF0000-0x0000000007EF1000-memory.dmpFilesize
4KB
-
memory/3556-133-0x0000000007FC0000-0x0000000007FC1000-memory.dmpFilesize
4KB
-
memory/3556-134-0x00000000081C0000-0x00000000081C1000-memory.dmpFilesize
4KB
-
memory/3556-135-0x0000000008220000-0x0000000008221000-memory.dmpFilesize
4KB