Analysis
-
max time kernel
81s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 14:31
Static task
static1
General
-
Target
28e2df8556bb1ead65a07f984113af78e1bfc3578c84acf714273658c00ef0fb.exe
-
Size
439KB
-
MD5
46737caa52b30fa405b1c3eb04293ddf
-
SHA1
7cd75e7222a301e95e4a2a2b7335c21155929098
-
SHA256
28e2df8556bb1ead65a07f984113af78e1bfc3578c84acf714273658c00ef0fb
-
SHA512
58c24a7e202f1a817c3b176170aa490f35f618bd3c9be3aaa67f3770a8d0c97baf38273e14aa540702b68ec5459fe940e4f22a38b3fbf5165ef31132613a33f2
Malware Config
Extracted
redline
NONAME
45.9.20.111:1355
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4084-118-0x0000000002410000-0x0000000002444000-memory.dmp family_redline behavioral1/memory/4084-120-0x0000000002640000-0x0000000002672000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
28e2df8556bb1ead65a07f984113af78e1bfc3578c84acf714273658c00ef0fb.exedescription pid process Token: SeDebugPrivilege 4084 28e2df8556bb1ead65a07f984113af78e1bfc3578c84acf714273658c00ef0fb.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4084-115-0x00000000008B0000-0x00000000008F3000-memory.dmpFilesize
268KB
-
memory/4084-116-0x0000000002350000-0x0000000002389000-memory.dmpFilesize
228KB
-
memory/4084-117-0x0000000000400000-0x00000000005F6000-memory.dmpFilesize
2.0MB
-
memory/4084-118-0x0000000002410000-0x0000000002444000-memory.dmpFilesize
208KB
-
memory/4084-119-0x0000000004E20000-0x000000000531E000-memory.dmpFilesize
5.0MB
-
memory/4084-120-0x0000000002640000-0x0000000002672000-memory.dmpFilesize
200KB
-
memory/4084-121-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/4084-123-0x0000000002633000-0x0000000002634000-memory.dmpFilesize
4KB
-
memory/4084-122-0x0000000002632000-0x0000000002633000-memory.dmpFilesize
4KB
-
memory/4084-124-0x0000000005320000-0x0000000005926000-memory.dmpFilesize
6.0MB
-
memory/4084-125-0x0000000002940000-0x0000000002952000-memory.dmpFilesize
72KB
-
memory/4084-126-0x0000000005930000-0x0000000005A3A000-memory.dmpFilesize
1.0MB
-
memory/4084-127-0x0000000005A40000-0x0000000005A7E000-memory.dmpFilesize
248KB
-
memory/4084-128-0x0000000005A80000-0x0000000005ACB000-memory.dmpFilesize
300KB
-
memory/4084-129-0x00000000025E0000-0x0000000002636000-memory.dmpFilesize
344KB
-
memory/4084-130-0x0000000005D00000-0x0000000005D66000-memory.dmpFilesize
408KB
-
memory/4084-131-0x00000000063A0000-0x0000000006416000-memory.dmpFilesize
472KB
-
memory/4084-132-0x0000000006460000-0x00000000064F2000-memory.dmpFilesize
584KB
-
memory/4084-133-0x0000000006550000-0x000000000656E000-memory.dmpFilesize
120KB
-
memory/4084-134-0x0000000006780000-0x0000000006942000-memory.dmpFilesize
1.8MB
-
memory/4084-135-0x0000000006950000-0x0000000006E7C000-memory.dmpFilesize
5.2MB