Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-10-2021 19:33
Static task
static1
Behavioral task
behavioral1
Sample
c38636896afd2bff5af0a8c641a50e0f.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
c38636896afd2bff5af0a8c641a50e0f.exe
Resource
win10-en-20211014
General
-
Target
c38636896afd2bff5af0a8c641a50e0f.exe
-
Size
441KB
-
MD5
c38636896afd2bff5af0a8c641a50e0f
-
SHA1
688967ba3b597755c31be44bf8daf3554840674d
-
SHA256
351b7b183ee55d280acfffc23886ef74efd76873d508704336bb782d84176f90
-
SHA512
b7248bcc030094f514ac89c6548812992b6eb6cf61b715469d7f83b43e82cb0bd2ddf0482690bd588f0309f682d3868951bebc6cdbd4fe54dcf6373863f63aeb
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1404-55-0x0000000000990000-0x00000000009BD000-memory.dmp family_redline behavioral1/memory/1404-56-0x0000000002550000-0x000000000257B000-memory.dmp family_redline -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c38636896afd2bff5af0a8c641a50e0f.exepid process 1404 c38636896afd2bff5af0a8c641a50e0f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c38636896afd2bff5af0a8c641a50e0f.exedescription pid process Token: SeDebugPrivilege 1404 c38636896afd2bff5af0a8c641a50e0f.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1404-54-0x0000000000309000-0x0000000000334000-memory.dmpFilesize
172KB
-
memory/1404-55-0x0000000000990000-0x00000000009BD000-memory.dmpFilesize
180KB
-
memory/1404-56-0x0000000002550000-0x000000000257B000-memory.dmpFilesize
172KB
-
memory/1404-57-0x00000000001B0000-0x00000000001F4000-memory.dmpFilesize
272KB
-
memory/1404-59-0x0000000004DA1000-0x0000000004DA2000-memory.dmpFilesize
4KB
-
memory/1404-58-0x0000000000400000-0x000000000089D000-memory.dmpFilesize
4.6MB
-
memory/1404-60-0x0000000004DA2000-0x0000000004DA3000-memory.dmpFilesize
4KB
-
memory/1404-61-0x0000000004DA3000-0x0000000004DA4000-memory.dmpFilesize
4KB
-
memory/1404-62-0x0000000004DA4000-0x0000000004DA6000-memory.dmpFilesize
8KB