Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    18-12-2021 09:06

General

  • Target

    1b0332f5e16ca53771e891705610b780.exe

  • Size

    532KB

  • MD5

    1b0332f5e16ca53771e891705610b780

  • SHA1

    b763b9f5c4f189b9ad29913b3eb8ec551dbe41a6

  • SHA256

    74c5701189877d6ff1cee769cfb34bd211feebbd4ad1e03c4f5c609dffe184ac

  • SHA512

    28cdc707438dcd5ab54e7a86e8a96fbaaa072c10eb3e4d24a0535d34206c4d67183521788f5cbc5ab27a7945c55501466cf29d564ad82041204b449b30b0a76b

Malware Config

Extracted

Family

redline

Botnet

test1

C2

212.114.52.221:47868

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b0332f5e16ca53771e891705610b780.exe
    "C:\Users\Admin\AppData\Local\Temp\1b0332f5e16ca53771e891705610b780.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\1b0332f5e16ca53771e891705610b780.exe
      C:\Users\Admin\AppData\Local\Temp\1b0332f5e16ca53771e891705610b780.exe
      2⤵
        PID:1064

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1064-58-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1064-59-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1064-60-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1064-61-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1064-62-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1064-63-0x000000000041932A-mapping.dmp
    • memory/1064-64-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1064-66-0x0000000001F50000-0x0000000001F51000-memory.dmp
      Filesize

      4KB

    • memory/1696-54-0x00000000008D0000-0x00000000008D1000-memory.dmp
      Filesize

      4KB

    • memory/1696-57-0x00000000002E0000-0x00000000002E1000-memory.dmp
      Filesize

      4KB

    • memory/1696-56-0x0000000004780000-0x0000000004781000-memory.dmp
      Filesize

      4KB