Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
05-11-2021 16:11
Static task
static1
General
-
Target
2a935998b748ea6d54aa4aea5ed09474a65257aa381d61b1718d45b5150367b0.exe
-
Size
412KB
-
MD5
ba953a4978ab084795ef5656238790d2
-
SHA1
29a71c605698ac8a03082b7978cb65a77a4831f7
-
SHA256
2a935998b748ea6d54aa4aea5ed09474a65257aa381d61b1718d45b5150367b0
-
SHA512
8f4169b03ed87b1daf7912118758861d6e382280871dfae5987709da1c2aecfe1f6b76d5bece62334ab3de5592e7423dd0ca58baf58043721a7606dcacf3b91b
Malware Config
Extracted
redline
SomeBody
185.215.113.29:36224
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2780-119-0x0000000002710000-0x000000000272C000-memory.dmp family_redline behavioral1/memory/2780-123-0x0000000002930000-0x000000000294B000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2a935998b748ea6d54aa4aea5ed09474a65257aa381d61b1718d45b5150367b0.exedescription pid process Token: SeDebugPrivilege 2780 2a935998b748ea6d54aa4aea5ed09474a65257aa381d61b1718d45b5150367b0.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2780-115-0x0000000000B19000-0x0000000000B3B000-memory.dmpFilesize
136KB
-
memory/2780-117-0x0000000000400000-0x000000000090B000-memory.dmpFilesize
5.0MB
-
memory/2780-116-0x0000000000990000-0x0000000000ADA000-memory.dmpFilesize
1.3MB
-
memory/2780-118-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/2780-119-0x0000000002710000-0x000000000272C000-memory.dmpFilesize
112KB
-
memory/2780-120-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/2780-121-0x0000000005142000-0x0000000005143000-memory.dmpFilesize
4KB
-
memory/2780-122-0x0000000005143000-0x0000000005144000-memory.dmpFilesize
4KB
-
memory/2780-123-0x0000000002930000-0x000000000294B000-memory.dmpFilesize
108KB
-
memory/2780-124-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/2780-125-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/2780-126-0x0000000005C60000-0x0000000005C61000-memory.dmpFilesize
4KB
-
memory/2780-127-0x0000000005144000-0x0000000005146000-memory.dmpFilesize
8KB
-
memory/2780-128-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/2780-129-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/2780-130-0x0000000005E90000-0x0000000005E91000-memory.dmpFilesize
4KB
-
memory/2780-131-0x0000000005F10000-0x0000000005F11000-memory.dmpFilesize
4KB
-
memory/2780-132-0x0000000006120000-0x0000000006121000-memory.dmpFilesize
4KB
-
memory/2780-133-0x0000000006290000-0x0000000006291000-memory.dmpFilesize
4KB
-
memory/2780-134-0x00000000069F0000-0x00000000069F1000-memory.dmpFilesize
4KB
-
memory/2780-135-0x0000000006BC0000-0x0000000006BC1000-memory.dmpFilesize
4KB