Analysis

  • max time kernel
    68s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    21-10-2021 08:20

General

  • Target

    8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9.exe

  • Size

    337KB

  • MD5

    620188cb6aaa339c107e09875cb09fbf

  • SHA1

    a80731b65b21450b6247569983fdd0cf224b78b3

  • SHA256

    8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9

  • SHA512

    597a091bcb8242597914ff6d260c0477e794d1cd12d2ecbac3f6ba27e5dace2f1ddcb5c0523a57b8b9093eba468b3c120b422322d6f4c81a7b5bfbb9d8117151

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9.exe
    "C:\Users\Admin\AppData\Local\Temp\8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1572

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1572-115-0x0000000002F20000-0x0000000002FCE000-memory.dmp
    Filesize

    696KB

  • memory/1572-116-0x0000000002F20000-0x0000000002FCE000-memory.dmp
    Filesize

    696KB

  • memory/1572-118-0x0000000000400000-0x0000000002F1B000-memory.dmp
    Filesize

    43.1MB

  • memory/1572-117-0x0000000004DA0000-0x0000000004DBF000-memory.dmp
    Filesize

    124KB

  • memory/1572-119-0x0000000004F60000-0x0000000004F61000-memory.dmp
    Filesize

    4KB

  • memory/1572-120-0x00000000075F0000-0x00000000075F1000-memory.dmp
    Filesize

    4KB

  • memory/1572-121-0x0000000004F10000-0x0000000004F2D000-memory.dmp
    Filesize

    116KB

  • memory/1572-122-0x0000000007AF0000-0x0000000007AF1000-memory.dmp
    Filesize

    4KB

  • memory/1572-123-0x00000000050F0000-0x00000000050F1000-memory.dmp
    Filesize

    4KB

  • memory/1572-124-0x0000000008100000-0x0000000008101000-memory.dmp
    Filesize

    4KB

  • memory/1572-125-0x0000000005110000-0x0000000005111000-memory.dmp
    Filesize

    4KB

  • memory/1572-126-0x0000000004F62000-0x0000000004F63000-memory.dmp
    Filesize

    4KB

  • memory/1572-127-0x0000000004F63000-0x0000000004F64000-memory.dmp
    Filesize

    4KB

  • memory/1572-128-0x0000000004F64000-0x0000000004F66000-memory.dmp
    Filesize

    8KB

  • memory/1572-129-0x0000000008210000-0x0000000008211000-memory.dmp
    Filesize

    4KB

  • memory/1572-130-0x00000000092E0000-0x00000000092E1000-memory.dmp
    Filesize

    4KB

  • memory/1572-131-0x00000000094B0000-0x00000000094B1000-memory.dmp
    Filesize

    4KB

  • memory/1572-132-0x00000000099E0000-0x00000000099E1000-memory.dmp
    Filesize

    4KB

  • memory/1572-133-0x0000000009D00000-0x0000000009D01000-memory.dmp
    Filesize

    4KB

  • memory/1572-134-0x0000000009E10000-0x0000000009E11000-memory.dmp
    Filesize

    4KB

  • memory/1572-135-0x0000000009FB0000-0x0000000009FB1000-memory.dmp
    Filesize

    4KB