Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    05-11-2021 11:55

General

  • Target

    460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79.exe

  • Size

    410KB

  • MD5

    d339ac891e9179c5d7f287395afbb891

  • SHA1

    635b6869d5a446cb4bd62c1f4a615017219f1313

  • SHA256

    460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79

  • SHA512

    ca73306c2cc700f3ad5409de6942094f567d3b85049f0398cc2bd77d05dd6282931316a73bcdba5fab9fa2ace16d7d06ab785bc9cef2e49b6eb08549c2188846

Malware Config

Extracted

Family

redline

Botnet

SomeBody

C2

185.215.113.29:36224

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79.exe
    "C:\Users\Admin\AppData\Local\Temp\460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2684

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2684-118-0x0000000000BA9000-0x0000000000BCB000-memory.dmp
    Filesize

    136KB

  • memory/2684-120-0x0000000000400000-0x000000000090A000-memory.dmp
    Filesize

    5.0MB

  • memory/2684-119-0x0000000000A60000-0x0000000000BAA000-memory.dmp
    Filesize

    1.3MB

  • memory/2684-121-0x00000000026F0000-0x000000000270C000-memory.dmp
    Filesize

    112KB

  • memory/2684-122-0x0000000005100000-0x0000000005101000-memory.dmp
    Filesize

    4KB

  • memory/2684-123-0x0000000002970000-0x000000000298B000-memory.dmp
    Filesize

    108KB

  • memory/2684-124-0x0000000005600000-0x0000000005601000-memory.dmp
    Filesize

    4KB

  • memory/2684-125-0x0000000002A10000-0x0000000002A11000-memory.dmp
    Filesize

    4KB

  • memory/2684-126-0x0000000005C10000-0x0000000005C11000-memory.dmp
    Filesize

    4KB

  • memory/2684-127-0x0000000002B50000-0x0000000002B51000-memory.dmp
    Filesize

    4KB

  • memory/2684-129-0x0000000002BC2000-0x0000000002BC3000-memory.dmp
    Filesize

    4KB

  • memory/2684-128-0x0000000002BC0000-0x0000000002BC1000-memory.dmp
    Filesize

    4KB

  • memory/2684-130-0x0000000002BC3000-0x0000000002BC4000-memory.dmp
    Filesize

    4KB

  • memory/2684-131-0x0000000002BC4000-0x0000000002BC6000-memory.dmp
    Filesize

    8KB

  • memory/2684-132-0x0000000005D20000-0x0000000005D21000-memory.dmp
    Filesize

    4KB

  • memory/2684-133-0x0000000005E90000-0x0000000005E91000-memory.dmp
    Filesize

    4KB

  • memory/2684-134-0x0000000005F10000-0x0000000005F11000-memory.dmp
    Filesize

    4KB

  • memory/2684-135-0x0000000006100000-0x0000000006101000-memory.dmp
    Filesize

    4KB

  • memory/2684-136-0x0000000006290000-0x0000000006291000-memory.dmp
    Filesize

    4KB

  • memory/2684-137-0x00000000069C0000-0x00000000069C1000-memory.dmp
    Filesize

    4KB

  • memory/2684-138-0x0000000006B90000-0x0000000006B91000-memory.dmp
    Filesize

    4KB