Analysis
-
max time kernel
80s -
max time network
127s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 03:20
Static task
static1
General
-
Target
e5a5364e0b81797dba300096f6683305d85e6e31f8a5f56b041a2f15f093b3f1.exe
-
Size
333KB
-
MD5
4c921d29652d37688d5d621b943d1268
-
SHA1
b129f4f435ef5d48855a0c5ee572a33d91762096
-
SHA256
e5a5364e0b81797dba300096f6683305d85e6e31f8a5f56b041a2f15f093b3f1
-
SHA512
3cd7a75fdcf8343b62b4a19b43157af77bf999ee78a19bf5741f69be0ef32820eb01c3df0be701cdf2201b3cef058414348f330aecb7259d0bf9973cc561d3fa
Malware Config
Extracted
redline
PUB
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2180-115-0x0000000004DF0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/2180-117-0x0000000005160000-0x000000000517D000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e5a5364e0b81797dba300096f6683305d85e6e31f8a5f56b041a2f15f093b3f1.exedescription pid process Token: SeDebugPrivilege 2180 e5a5364e0b81797dba300096f6683305d85e6e31f8a5f56b041a2f15f093b3f1.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2180-115-0x0000000004DF0000-0x0000000004E0F000-memory.dmpFilesize
124KB
-
memory/2180-116-0x00000000078B0000-0x00000000078B1000-memory.dmpFilesize
4KB
-
memory/2180-117-0x0000000005160000-0x000000000517D000-memory.dmpFilesize
116KB
-
memory/2180-119-0x0000000004C70000-0x0000000004CA0000-memory.dmpFilesize
192KB
-
memory/2180-120-0x0000000000400000-0x0000000002F1A000-memory.dmpFilesize
43.1MB
-
memory/2180-118-0x0000000002FB0000-0x000000000305E000-memory.dmpFilesize
696KB
-
memory/2180-122-0x0000000007DB0000-0x0000000007DB1000-memory.dmpFilesize
4KB
-
memory/2180-123-0x00000000078A2000-0x00000000078A3000-memory.dmpFilesize
4KB
-
memory/2180-124-0x00000000078A3000-0x00000000078A4000-memory.dmpFilesize
4KB
-
memory/2180-121-0x00000000078A0000-0x00000000078A1000-memory.dmpFilesize
4KB
-
memory/2180-125-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/2180-126-0x00000000076C0000-0x00000000076C1000-memory.dmpFilesize
4KB
-
memory/2180-127-0x00000000077D0000-0x00000000077D1000-memory.dmpFilesize
4KB
-
memory/2180-128-0x00000000078A4000-0x00000000078A6000-memory.dmpFilesize
8KB
-
memory/2180-129-0x0000000007820000-0x0000000007821000-memory.dmpFilesize
4KB
-
memory/2180-130-0x0000000008F60000-0x0000000008F61000-memory.dmpFilesize
4KB
-
memory/2180-131-0x0000000009130000-0x0000000009131000-memory.dmpFilesize
4KB
-
memory/2180-132-0x0000000009770000-0x0000000009771000-memory.dmpFilesize
4KB
-
memory/2180-133-0x0000000009AC0000-0x0000000009AC1000-memory.dmpFilesize
4KB
-
memory/2180-134-0x0000000009BD0000-0x0000000009BD1000-memory.dmpFilesize
4KB
-
memory/2180-135-0x0000000009C70000-0x0000000009C71000-memory.dmpFilesize
4KB