Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 03:48
Static task
static1
Behavioral task
behavioral1
Sample
70a5c13cfe466503802918e5710256c80529a8702f500994e95754705961019b.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
70a5c13cfe466503802918e5710256c80529a8702f500994e95754705961019b.exe
-
Size
438KB
-
MD5
cf7333d9e77df7ba1952081e9810b853
-
SHA1
0e0f8986eb9adb35d2105988fe3836abb7b260a4
-
SHA256
70a5c13cfe466503802918e5710256c80529a8702f500994e95754705961019b
-
SHA512
4e49ea9860138fd09d5c337afb18614ce9a049283f51014b4bdc3b4648e597aefdf469bd88b1f9b87a93648d94693230438fdd8a6496de3bf6b3d19a688197c9
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
NONAME
C2
45.9.20.111:1355
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2236-142-0x0000000002420000-0x0000000002454000-memory.dmp family_redline behavioral1/memory/2236-162-0x0000000002820000-0x0000000002852000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
70a5c13cfe466503802918e5710256c80529a8702f500994e95754705961019b.exedescription pid process Token: SeDebugPrivilege 2236 70a5c13cfe466503802918e5710256c80529a8702f500994e95754705961019b.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2236-118-0x0000000000890000-0x00000000008D3000-memory.dmpFilesize
268KB
-
memory/2236-119-0x0000000002330000-0x0000000002369000-memory.dmpFilesize
228KB
-
memory/2236-120-0x0000000000400000-0x00000000005F5000-memory.dmpFilesize
2.0MB
-
memory/2236-142-0x0000000002420000-0x0000000002454000-memory.dmpFilesize
208KB
-
memory/2236-156-0x0000000004E80000-0x000000000537E000-memory.dmpFilesize
5.0MB
-
memory/2236-162-0x0000000002820000-0x0000000002852000-memory.dmpFilesize
200KB
-
memory/2236-166-0x0000000005380000-0x0000000005986000-memory.dmpFilesize
6.0MB
-
memory/2236-167-0x0000000002A20000-0x0000000002A32000-memory.dmpFilesize
72KB
-
memory/2236-168-0x0000000005990000-0x0000000005A9A000-memory.dmpFilesize
1.0MB
-
memory/2236-171-0x0000000004DE0000-0x0000000004E1E000-memory.dmpFilesize
248KB
-
memory/2236-197-0x0000000005AA0000-0x0000000005AEB000-memory.dmpFilesize
300KB