Resubmissions

29-10-2024 12:19

241029-pg5r4atqdz 10

01-12-2021 21:00

211201-ztqh2sbbb3 10

Analysis

  • max time kernel
    110s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    01-12-2021 21:00

General

  • Target

    379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe

  • Size

    442KB

  • MD5

    dbc8c65968ed3823a9716478dbd9d49a

  • SHA1

    0a63ad61469fa208cef9d6b1d8c3f9de5ad0a899

  • SHA256

    379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe

  • SHA512

    c44f457f6668bded436acad1b94dfab2bafcceb978aacb1f814e06eb65374a3b5f052a7c05182aa898e4fc12fa8c1743d8229c646e49689e8e2fe39b9e83f412

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe
    "C:\Users\Admin\AppData\Local\Temp\379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2536-118-0x00000000006C1000-0x00000000006ED000-memory.dmp

    Filesize

    176KB

  • memory/2536-119-0x00000000001C0000-0x00000000001F9000-memory.dmp

    Filesize

    228KB

  • memory/2536-120-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/2536-121-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/2536-122-0x0000000002670000-0x0000000002671000-memory.dmp

    Filesize

    4KB

  • memory/2536-123-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

    Filesize

    4KB

  • memory/2536-124-0x0000000002640000-0x000000000266C000-memory.dmp

    Filesize

    176KB

  • memory/2536-125-0x00000000050F0000-0x00000000050F1000-memory.dmp

    Filesize

    4KB

  • memory/2536-126-0x0000000005780000-0x0000000005781000-memory.dmp

    Filesize

    4KB

  • memory/2536-127-0x00000000057B0000-0x00000000057B1000-memory.dmp

    Filesize

    4KB

  • memory/2536-128-0x0000000005900000-0x0000000005901000-memory.dmp

    Filesize

    4KB

  • memory/2536-130-0x0000000002673000-0x0000000002674000-memory.dmp

    Filesize

    4KB

  • memory/2536-129-0x0000000002672000-0x0000000002673000-memory.dmp

    Filesize

    4KB

  • memory/2536-131-0x0000000002674000-0x0000000002676000-memory.dmp

    Filesize

    8KB

  • memory/2536-132-0x0000000005950000-0x0000000005951000-memory.dmp

    Filesize

    4KB

  • memory/2536-133-0x0000000005AF0000-0x0000000005AF1000-memory.dmp

    Filesize

    4KB

  • memory/2536-134-0x0000000006290000-0x0000000006291000-memory.dmp

    Filesize

    4KB

  • memory/2536-135-0x0000000006350000-0x0000000006351000-memory.dmp

    Filesize

    4KB

  • memory/2536-136-0x0000000006550000-0x0000000006551000-memory.dmp

    Filesize

    4KB

  • memory/2536-137-0x0000000006770000-0x0000000006771000-memory.dmp

    Filesize

    4KB

  • memory/2536-138-0x0000000006940000-0x0000000006941000-memory.dmp

    Filesize

    4KB