Analysis
-
max time kernel
66s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 04:40
Static task
static1
General
-
Target
471539df16ef875d44a57b02dc7b93649e502a71d07bc03a4cb47346f7d7607c.exe
-
Size
337KB
-
MD5
3e09ee119a8fc53c3daa96232a3c74f6
-
SHA1
d3c670f92aade4e57e63ef6248f253bf206384a6
-
SHA256
471539df16ef875d44a57b02dc7b93649e502a71d07bc03a4cb47346f7d7607c
-
SHA512
50f5b8e5ec5c22de012e9e09d276a05cc81ed83c88d58d998fb8ccaaca67cffa10d091cb32b58bd03db24ec38f68717aa9ee19109b86761835d439a4c830728c
Malware Config
Extracted
redline
UTS
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1576-118-0x00000000050B0000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1576-120-0x0000000005140000-0x000000000515D000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
471539df16ef875d44a57b02dc7b93649e502a71d07bc03a4cb47346f7d7607c.exedescription pid process Token: SeDebugPrivilege 1576 471539df16ef875d44a57b02dc7b93649e502a71d07bc03a4cb47346f7d7607c.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1576-116-0x0000000004CB0000-0x0000000004CE0000-memory.dmpFilesize
192KB
-
memory/1576-115-0x0000000004C70000-0x0000000004C92000-memory.dmpFilesize
136KB
-
memory/1576-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/1576-118-0x00000000050B0000-0x00000000050CF000-memory.dmpFilesize
124KB
-
memory/1576-119-0x0000000007830000-0x0000000007831000-memory.dmpFilesize
4KB
-
memory/1576-120-0x0000000005140000-0x000000000515D000-memory.dmpFilesize
116KB
-
memory/1576-121-0x0000000007D30000-0x0000000007D31000-memory.dmpFilesize
4KB
-
memory/1576-122-0x0000000005300000-0x0000000005301000-memory.dmpFilesize
4KB
-
memory/1576-123-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB
-
memory/1576-124-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/1576-125-0x0000000005422000-0x0000000005423000-memory.dmpFilesize
4KB
-
memory/1576-126-0x0000000005424000-0x0000000005426000-memory.dmpFilesize
8KB
-
memory/1576-127-0x0000000005423000-0x0000000005424000-memory.dmpFilesize
4KB
-
memory/1576-128-0x0000000005340000-0x0000000005341000-memory.dmpFilesize
4KB
-
memory/1576-129-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/1576-130-0x0000000009420000-0x0000000009421000-memory.dmpFilesize
4KB
-
memory/1576-131-0x00000000095F0000-0x00000000095F1000-memory.dmpFilesize
4KB
-
memory/1576-132-0x0000000009B20000-0x0000000009B21000-memory.dmpFilesize
4KB
-
memory/1576-133-0x0000000009C00000-0x0000000009C01000-memory.dmpFilesize
4KB
-
memory/1576-134-0x0000000009DC0000-0x0000000009DC1000-memory.dmpFilesize
4KB
-
memory/1576-135-0x0000000009E40000-0x0000000009E41000-memory.dmpFilesize
4KB