Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-01-2022 09:22

General

  • Target

    de4524eb13c0f483b7a146772451aa59.exe

  • Size

    408KB

  • MD5

    de4524eb13c0f483b7a146772451aa59

  • SHA1

    42160f73bfeab52bdd12c16cab0de7917dae5c4b

  • SHA256

    4ae6d0ed8c778b00a22f29cd6e90e0a8cde3f6518d8c564c3cdaeba392343c14

  • SHA512

    ffe0243d7f8445ffa972a3a1dbc6a5464c1ec0b5c6d2a324ae6a3f7f636f9063bc98f57b96868035e5bb01ca48146f4998aa324104232dd53b8207167a8e115c

Malware Config

Extracted

Family

redline

Botnet

Testing

C2

185.215.113.10:39759

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de4524eb13c0f483b7a146772451aa59.exe
    "C:\Users\Admin\AppData\Local\Temp\de4524eb13c0f483b7a146772451aa59.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1624-53-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/1624-54-0x0000000000250000-0x0000000000289000-memory.dmp

    Filesize

    228KB

  • memory/1624-55-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/1624-56-0x0000000001F50000-0x0000000001F84000-memory.dmp

    Filesize

    208KB

  • memory/1624-57-0x0000000001F80000-0x0000000001FB2000-memory.dmp

    Filesize

    200KB

  • memory/1624-58-0x00000000049B1000-0x00000000049B2000-memory.dmp

    Filesize

    4KB

  • memory/1624-60-0x00000000049B3000-0x00000000049B4000-memory.dmp

    Filesize

    4KB

  • memory/1624-59-0x00000000049B2000-0x00000000049B3000-memory.dmp

    Filesize

    4KB

  • memory/1624-61-0x00000000049B4000-0x00000000049B6000-memory.dmp

    Filesize

    8KB

  • memory/1624-62-0x0000000076C61000-0x0000000076C63000-memory.dmp

    Filesize

    8KB