Analysis
-
max time kernel
68s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 08:20
Static task
static1
General
-
Target
8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9.exe
-
Size
337KB
-
MD5
620188cb6aaa339c107e09875cb09fbf
-
SHA1
a80731b65b21450b6247569983fdd0cf224b78b3
-
SHA256
8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9
-
SHA512
597a091bcb8242597914ff6d260c0477e794d1cd12d2ecbac3f6ba27e5dace2f1ddcb5c0523a57b8b9093eba468b3c120b422322d6f4c81a7b5bfbb9d8117151
Malware Config
Extracted
redline
UTS
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1572-117-0x0000000004DA0000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/1572-121-0x0000000004F10000-0x0000000004F2D000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9.exedescription pid process Token: SeDebugPrivilege 1572 8a5f042309d6e151cecce4d0bbc7b60f5c49399ce92ff8613643ab347adf86b9.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1572-115-0x0000000002F20000-0x0000000002FCE000-memory.dmpFilesize
696KB
-
memory/1572-116-0x0000000002F20000-0x0000000002FCE000-memory.dmpFilesize
696KB
-
memory/1572-118-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/1572-117-0x0000000004DA0000-0x0000000004DBF000-memory.dmpFilesize
124KB
-
memory/1572-119-0x0000000004F60000-0x0000000004F61000-memory.dmpFilesize
4KB
-
memory/1572-120-0x00000000075F0000-0x00000000075F1000-memory.dmpFilesize
4KB
-
memory/1572-121-0x0000000004F10000-0x0000000004F2D000-memory.dmpFilesize
116KB
-
memory/1572-122-0x0000000007AF0000-0x0000000007AF1000-memory.dmpFilesize
4KB
-
memory/1572-123-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/1572-124-0x0000000008100000-0x0000000008101000-memory.dmpFilesize
4KB
-
memory/1572-125-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/1572-126-0x0000000004F62000-0x0000000004F63000-memory.dmpFilesize
4KB
-
memory/1572-127-0x0000000004F63000-0x0000000004F64000-memory.dmpFilesize
4KB
-
memory/1572-128-0x0000000004F64000-0x0000000004F66000-memory.dmpFilesize
8KB
-
memory/1572-129-0x0000000008210000-0x0000000008211000-memory.dmpFilesize
4KB
-
memory/1572-130-0x00000000092E0000-0x00000000092E1000-memory.dmpFilesize
4KB
-
memory/1572-131-0x00000000094B0000-0x00000000094B1000-memory.dmpFilesize
4KB
-
memory/1572-132-0x00000000099E0000-0x00000000099E1000-memory.dmpFilesize
4KB
-
memory/1572-133-0x0000000009D00000-0x0000000009D01000-memory.dmpFilesize
4KB
-
memory/1572-134-0x0000000009E10000-0x0000000009E11000-memory.dmpFilesize
4KB
-
memory/1572-135-0x0000000009FB0000-0x0000000009FB1000-memory.dmpFilesize
4KB