Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19-01-2022 02:01
Static task
static1
General
-
Target
ed3c75b50492274dcbaab72c009c08bece885033ca84d7f00c8dfc73fefd5633.exe
-
Size
416KB
-
MD5
eb7af73ac87aa9807420de4e09496c04
-
SHA1
749bba98e58c1974ea79da6b13e4a6c843868c7a
-
SHA256
ed3c75b50492274dcbaab72c009c08bece885033ca84d7f00c8dfc73fefd5633
-
SHA512
198b3294e4600fd82e254698ce30339548b58b642fd0f86e9be8b8e0aa00b2ae94b52ee1a5d244f285e9457a5888af78f1532d01825c07bf7deb0163f29935b9
Malware Config
Extracted
redline
noname
185.215.113.29:34865
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3772-121-0x0000000000AF0000-0x0000000000B24000-memory.dmp family_redline behavioral1/memory/3772-123-0x0000000002400000-0x0000000002432000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ed3c75b50492274dcbaab72c009c08bece885033ca84d7f00c8dfc73fefd5633.exedescription pid process Token: SeDebugPrivilege 3772 ed3c75b50492274dcbaab72c009c08bece885033ca84d7f00c8dfc73fefd5633.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3772-118-0x0000000000470000-0x00000000005BA000-memory.dmpFilesize
1.3MB
-
memory/3772-119-0x0000000000470000-0x00000000005BA000-memory.dmpFilesize
1.3MB
-
memory/3772-120-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/3772-121-0x0000000000AF0000-0x0000000000B24000-memory.dmpFilesize
208KB
-
memory/3772-122-0x0000000004A60000-0x0000000004F5E000-memory.dmpFilesize
5.0MB
-
memory/3772-123-0x0000000002400000-0x0000000002432000-memory.dmpFilesize
200KB
-
memory/3772-125-0x00000000025E2000-0x00000000025E3000-memory.dmpFilesize
4KB
-
memory/3772-124-0x00000000025E0000-0x00000000025E1000-memory.dmpFilesize
4KB
-
memory/3772-126-0x00000000025E3000-0x00000000025E4000-memory.dmpFilesize
4KB
-
memory/3772-127-0x0000000004F60000-0x0000000005566000-memory.dmpFilesize
6.0MB
-
memory/3772-128-0x00000000055F0000-0x0000000005602000-memory.dmpFilesize
72KB
-
memory/3772-129-0x0000000005620000-0x000000000572A000-memory.dmpFilesize
1.0MB
-
memory/3772-130-0x0000000005770000-0x00000000057AE000-memory.dmpFilesize
248KB
-
memory/3772-131-0x00000000057C0000-0x000000000580B000-memory.dmpFilesize
300KB
-
memory/3772-132-0x00000000025A0000-0x00000000025E6000-memory.dmpFilesize
280KB
-
memory/3772-133-0x0000000005A60000-0x0000000005AC6000-memory.dmpFilesize
408KB
-
memory/3772-134-0x0000000006120000-0x0000000006196000-memory.dmpFilesize
472KB
-
memory/3772-135-0x00000000061B0000-0x0000000006242000-memory.dmpFilesize
584KB
-
memory/3772-136-0x00000000063B0000-0x00000000063CE000-memory.dmpFilesize
120KB
-
memory/3772-137-0x00000000064E0000-0x00000000066A2000-memory.dmpFilesize
1.8MB
-
memory/3772-138-0x00000000066B0000-0x0000000006BDC000-memory.dmpFilesize
5.2MB