Analysis
-
max time kernel
88s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
29-11-2021 02:28
Static task
static1
General
-
Target
7a6052b9bfb8d0a6895c11a92d2ada09dda873c78ad7cdf90bfcb8a5fae262c9.exe
-
Size
425KB
-
MD5
a5c636fa5ccd2657e9a04274e23ba8b0
-
SHA1
feea6bafdbf5bbc39e7bf29969822dca17ee444f
-
SHA256
7a6052b9bfb8d0a6895c11a92d2ada09dda873c78ad7cdf90bfcb8a5fae262c9
-
SHA512
41e12d68cd853fa796312b9f6a84e1504b5c227e438941c77112800b239fcbec35ab7619db38e87465ed180068b5f5af90dc50294ca2294bb7ad76e0eb5ce259
Malware Config
Extracted
redline
bbtt1
212.193.30.196:13040
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2432-121-0x0000000005060000-0x000000000508E000-memory.dmp family_redline behavioral1/memory/2432-123-0x0000000005230000-0x000000000525C000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7a6052b9bfb8d0a6895c11a92d2ada09dda873c78ad7cdf90bfcb8a5fae262c9.exedescription pid process Token: SeDebugPrivilege 2432 7a6052b9bfb8d0a6895c11a92d2ada09dda873c78ad7cdf90bfcb8a5fae262c9.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2432-118-0x00000000034D6000-0x0000000003502000-memory.dmpFilesize
176KB
-
memory/2432-119-0x0000000003250000-0x000000000339A000-memory.dmpFilesize
1.3MB
-
memory/2432-120-0x0000000000400000-0x0000000003245000-memory.dmpFilesize
46.3MB
-
memory/2432-121-0x0000000005060000-0x000000000508E000-memory.dmpFilesize
184KB
-
memory/2432-122-0x00000000079D0000-0x00000000079D1000-memory.dmpFilesize
4KB
-
memory/2432-123-0x0000000005230000-0x000000000525C000-memory.dmpFilesize
176KB
-
memory/2432-124-0x0000000007ED0000-0x0000000007ED1000-memory.dmpFilesize
4KB
-
memory/2432-125-0x0000000005530000-0x0000000005531000-memory.dmpFilesize
4KB
-
memory/2432-126-0x00000000079C0000-0x00000000079C1000-memory.dmpFilesize
4KB
-
memory/2432-127-0x00000000079C2000-0x00000000079C3000-memory.dmpFilesize
4KB
-
memory/2432-129-0x00000000084E0000-0x00000000084E1000-memory.dmpFilesize
4KB
-
memory/2432-128-0x00000000079C3000-0x00000000079C4000-memory.dmpFilesize
4KB
-
memory/2432-130-0x00000000078F0000-0x00000000078F1000-memory.dmpFilesize
4KB
-
memory/2432-131-0x0000000007940000-0x0000000007941000-memory.dmpFilesize
4KB
-
memory/2432-132-0x00000000079C4000-0x00000000079C6000-memory.dmpFilesize
8KB
-
memory/2432-133-0x0000000008710000-0x0000000008711000-memory.dmpFilesize
4KB
-
memory/2432-134-0x0000000008EC0000-0x0000000008EC1000-memory.dmpFilesize
4KB
-
memory/2432-135-0x0000000008F70000-0x0000000008F71000-memory.dmpFilesize
4KB
-
memory/2432-136-0x0000000009160000-0x0000000009161000-memory.dmpFilesize
4KB
-
memory/2432-137-0x0000000009E40000-0x0000000009E41000-memory.dmpFilesize
4KB
-
memory/2432-138-0x000000000A010000-0x000000000A011000-memory.dmpFilesize
4KB