Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
05-11-2021 18:33
Static task
static1
General
-
Target
6b95f2e2951eef756abab3d8ff6a757219c2153c83792129abc627c03ae3cd79.exe
-
Size
412KB
-
MD5
be212bc1ca38a2186ef9a69a94246e42
-
SHA1
e6f146e41b4fc9d58971b644a87387ed37508237
-
SHA256
6b95f2e2951eef756abab3d8ff6a757219c2153c83792129abc627c03ae3cd79
-
SHA512
c7450a3834e33ec62101bc218da9fbd6851de236ddaaa52c5d8b2bbbee11c912941832eedc757b561b92a858b65463f38262203195bd988ad968a9e1bce05c70
Malware Config
Extracted
redline
SomeBody
185.215.113.29:36224
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2592-120-0x0000000002740000-0x000000000275C000-memory.dmp family_redline behavioral1/memory/2592-126-0x00000000029F0000-0x0000000002A0B000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6b95f2e2951eef756abab3d8ff6a757219c2153c83792129abc627c03ae3cd79.exedescription pid process Token: SeDebugPrivilege 2592 6b95f2e2951eef756abab3d8ff6a757219c2153c83792129abc627c03ae3cd79.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2592-119-0x0000000000A00000-0x0000000000B4A000-memory.dmpFilesize
1.3MB
-
memory/2592-120-0x0000000002740000-0x000000000275C000-memory.dmpFilesize
112KB
-
memory/2592-122-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/2592-121-0x0000000000400000-0x000000000090B000-memory.dmpFilesize
5.0MB
-
memory/2592-123-0x00000000051A2000-0x00000000051A3000-memory.dmpFilesize
4KB
-
memory/2592-124-0x00000000051A3000-0x00000000051A4000-memory.dmpFilesize
4KB
-
memory/2592-125-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/2592-126-0x00000000029F0000-0x0000000002A0B000-memory.dmpFilesize
108KB
-
memory/2592-127-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/2592-128-0x0000000002BC0000-0x0000000002BC1000-memory.dmpFilesize
4KB
-
memory/2592-129-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/2592-130-0x0000000005CC0000-0x0000000005CC1000-memory.dmpFilesize
4KB
-
memory/2592-131-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/2592-132-0x00000000051A4000-0x00000000051A6000-memory.dmpFilesize
8KB
-
memory/2592-133-0x0000000005F90000-0x0000000005F91000-memory.dmpFilesize
4KB
-
memory/2592-134-0x00000000066A0000-0x00000000066A1000-memory.dmpFilesize
4KB
-
memory/2592-135-0x0000000006720000-0x0000000006721000-memory.dmpFilesize
4KB
-
memory/2592-136-0x0000000006800000-0x0000000006801000-memory.dmpFilesize
4KB
-
memory/2592-137-0x00000000069C0000-0x00000000069C1000-memory.dmpFilesize
4KB
-
memory/2592-138-0x0000000006BB0000-0x0000000006BB1000-memory.dmpFilesize
4KB