Analysis

  • max time kernel
    111s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    26-11-2021 19:30

General

  • Target

    c939bf838b1f193eee5a45fc71ee9e496d55207032013db4d7afe2d313e30ac4.exe

  • Size

    296KB

  • MD5

    d00e3939030d8b7c88b002a318852839

  • SHA1

    543b15c5a95451698f11c0b506df0e05447c261e

  • SHA256

    c939bf838b1f193eee5a45fc71ee9e496d55207032013db4d7afe2d313e30ac4

  • SHA512

    c29f096edb72fdfd451defa8f5742f7bbfa6ec99c11fdde5e59c09665f94de5fc9d5ee55f7a1b577d952fae54efbb8840a350f82d15c7aaba1f5c391e672ffca

Malware Config

Extracted

Family

redline

Botnet

Updbdate

C2

193.56.146.64:65441

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c939bf838b1f193eee5a45fc71ee9e496d55207032013db4d7afe2d313e30ac4.exe
    "C:\Users\Admin\AppData\Local\Temp\c939bf838b1f193eee5a45fc71ee9e496d55207032013db4d7afe2d313e30ac4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3996

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3996-119-0x0000000002080000-0x00000000020B9000-memory.dmp
    Filesize

    228KB

  • memory/3996-118-0x0000000000460000-0x00000000005AA000-memory.dmp
    Filesize

    1.3MB

  • memory/3996-120-0x0000000000400000-0x0000000000453000-memory.dmp
    Filesize

    332KB

  • memory/3996-121-0x0000000004B00000-0x0000000004B01000-memory.dmp
    Filesize

    4KB

  • memory/3996-122-0x0000000004980000-0x00000000049AE000-memory.dmp
    Filesize

    184KB

  • memory/3996-123-0x0000000004B10000-0x0000000004B11000-memory.dmp
    Filesize

    4KB

  • memory/3996-124-0x00000000049F0000-0x0000000004A1C000-memory.dmp
    Filesize

    176KB

  • memory/3996-126-0x0000000004B03000-0x0000000004B04000-memory.dmp
    Filesize

    4KB

  • memory/3996-125-0x0000000004B02000-0x0000000004B03000-memory.dmp
    Filesize

    4KB

  • memory/3996-127-0x0000000005010000-0x0000000005011000-memory.dmp
    Filesize

    4KB

  • memory/3996-128-0x0000000004AB0000-0x0000000004AB1000-memory.dmp
    Filesize

    4KB

  • memory/3996-129-0x0000000005620000-0x0000000005621000-memory.dmp
    Filesize

    4KB

  • memory/3996-130-0x0000000004B04000-0x0000000004B06000-memory.dmp
    Filesize

    8KB

  • memory/3996-131-0x0000000005730000-0x0000000005731000-memory.dmp
    Filesize

    4KB

  • memory/3996-132-0x00000000057A0000-0x00000000057A1000-memory.dmp
    Filesize

    4KB

  • memory/3996-133-0x0000000005A30000-0x0000000005A31000-memory.dmp
    Filesize

    4KB

  • memory/3996-134-0x00000000060F0000-0x00000000060F1000-memory.dmp
    Filesize

    4KB

  • memory/3996-135-0x00000000061A0000-0x00000000061A1000-memory.dmp
    Filesize

    4KB

  • memory/3996-136-0x00000000063A0000-0x00000000063A1000-memory.dmp
    Filesize

    4KB

  • memory/3996-137-0x00000000064C0000-0x00000000064C1000-memory.dmp
    Filesize

    4KB

  • memory/3996-138-0x0000000006690000-0x0000000006691000-memory.dmp
    Filesize

    4KB