Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
05-11-2021 11:55
Static task
static1
General
-
Target
460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79.exe
-
Size
410KB
-
MD5
d339ac891e9179c5d7f287395afbb891
-
SHA1
635b6869d5a446cb4bd62c1f4a615017219f1313
-
SHA256
460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79
-
SHA512
ca73306c2cc700f3ad5409de6942094f567d3b85049f0398cc2bd77d05dd6282931316a73bcdba5fab9fa2ace16d7d06ab785bc9cef2e49b6eb08549c2188846
Malware Config
Extracted
redline
SomeBody
185.215.113.29:36224
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2684-121-0x00000000026F0000-0x000000000270C000-memory.dmp family_redline behavioral1/memory/2684-123-0x0000000002970000-0x000000000298B000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79.exedescription pid process Token: SeDebugPrivilege 2684 460023fbe9697803c2a77a235479d69bfd6a97444b1d7b1650ca89e57694ef79.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2684-118-0x0000000000BA9000-0x0000000000BCB000-memory.dmpFilesize
136KB
-
memory/2684-120-0x0000000000400000-0x000000000090A000-memory.dmpFilesize
5.0MB
-
memory/2684-119-0x0000000000A60000-0x0000000000BAA000-memory.dmpFilesize
1.3MB
-
memory/2684-121-0x00000000026F0000-0x000000000270C000-memory.dmpFilesize
112KB
-
memory/2684-122-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/2684-123-0x0000000002970000-0x000000000298B000-memory.dmpFilesize
108KB
-
memory/2684-124-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/2684-125-0x0000000002A10000-0x0000000002A11000-memory.dmpFilesize
4KB
-
memory/2684-126-0x0000000005C10000-0x0000000005C11000-memory.dmpFilesize
4KB
-
memory/2684-127-0x0000000002B50000-0x0000000002B51000-memory.dmpFilesize
4KB
-
memory/2684-129-0x0000000002BC2000-0x0000000002BC3000-memory.dmpFilesize
4KB
-
memory/2684-128-0x0000000002BC0000-0x0000000002BC1000-memory.dmpFilesize
4KB
-
memory/2684-130-0x0000000002BC3000-0x0000000002BC4000-memory.dmpFilesize
4KB
-
memory/2684-131-0x0000000002BC4000-0x0000000002BC6000-memory.dmpFilesize
8KB
-
memory/2684-132-0x0000000005D20000-0x0000000005D21000-memory.dmpFilesize
4KB
-
memory/2684-133-0x0000000005E90000-0x0000000005E91000-memory.dmpFilesize
4KB
-
memory/2684-134-0x0000000005F10000-0x0000000005F11000-memory.dmpFilesize
4KB
-
memory/2684-135-0x0000000006100000-0x0000000006101000-memory.dmpFilesize
4KB
-
memory/2684-136-0x0000000006290000-0x0000000006291000-memory.dmpFilesize
4KB
-
memory/2684-137-0x00000000069C0000-0x00000000069C1000-memory.dmpFilesize
4KB
-
memory/2684-138-0x0000000006B90000-0x0000000006B91000-memory.dmpFilesize
4KB