Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 03:20
Static task
static1
General
-
Target
9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d.exe
-
Size
333KB
-
MD5
50fc188ed724e7ed2e6f5b7f801274d8
-
SHA1
9e3eb58d6433db486e35e85a91eb9c165e5d10d5
-
SHA256
9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d
-
SHA512
fbfbfff76e9d4150ca52c37d94395d7d4bafe6ab1fd7f78288e1130166530b2cf445ec43cd2ce22e29b9cabd006e252a3e09882aa51e74a4f16adad85339638c
Malware Config
Extracted
redline
UDP
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1832-118-0x0000000004EF0000-0x0000000004F0F000-memory.dmp family_redline behavioral1/memory/1832-120-0x0000000004F90000-0x0000000004FAD000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d.exedescription pid process Token: SeDebugPrivilege 1832 9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1832-115-0x00000000030C0000-0x00000000030E2000-memory.dmpFilesize
136KB
-
memory/1832-116-0x00000000030F0000-0x0000000003120000-memory.dmpFilesize
192KB
-
memory/1832-117-0x0000000000400000-0x0000000002F1A000-memory.dmpFilesize
43.1MB
-
memory/1832-118-0x0000000004EF0000-0x0000000004F0F000-memory.dmpFilesize
124KB
-
memory/1832-119-0x00000000077B0000-0x00000000077B1000-memory.dmpFilesize
4KB
-
memory/1832-120-0x0000000004F90000-0x0000000004FAD000-memory.dmpFilesize
116KB
-
memory/1832-122-0x0000000007CB0000-0x0000000007CB1000-memory.dmpFilesize
4KB
-
memory/1832-123-0x00000000077A2000-0x00000000077A3000-memory.dmpFilesize
4KB
-
memory/1832-121-0x00000000077A0000-0x00000000077A1000-memory.dmpFilesize
4KB
-
memory/1832-124-0x00000000077A3000-0x00000000077A4000-memory.dmpFilesize
4KB
-
memory/1832-125-0x0000000007680000-0x0000000007681000-memory.dmpFilesize
4KB
-
memory/1832-126-0x00000000082C0000-0x00000000082C1000-memory.dmpFilesize
4KB
-
memory/1832-127-0x00000000077A4000-0x00000000077A6000-memory.dmpFilesize
8KB
-
memory/1832-128-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB
-
memory/1832-129-0x0000000007710000-0x0000000007711000-memory.dmpFilesize
4KB
-
memory/1832-130-0x0000000008F60000-0x0000000008F61000-memory.dmpFilesize
4KB
-
memory/1832-131-0x0000000009130000-0x0000000009131000-memory.dmpFilesize
4KB
-
memory/1832-132-0x0000000009770000-0x0000000009771000-memory.dmpFilesize
4KB
-
memory/1832-133-0x0000000009840000-0x0000000009841000-memory.dmpFilesize
4KB
-
memory/1832-134-0x0000000009A30000-0x0000000009A31000-memory.dmpFilesize
4KB
-
memory/1832-135-0x0000000009AD0000-0x0000000009AD1000-memory.dmpFilesize
4KB