Analysis
-
max time kernel
142s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 10:30
Static task
static1
Behavioral task
behavioral1
Sample
586f15235b0f2277a2cb82fd96261e4167c3e2ca7c2c34bd30165bbd38537e6f.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
586f15235b0f2277a2cb82fd96261e4167c3e2ca7c2c34bd30165bbd38537e6f.exe
-
Size
402KB
-
MD5
91606d0e2881a66d0384e438d853dc90
-
SHA1
e41b42d6385e50ee09dc73d8a9131634bd8f54b0
-
SHA256
586f15235b0f2277a2cb82fd96261e4167c3e2ca7c2c34bd30165bbd38537e6f
-
SHA512
51491d80bb5954d3ac2ba62576219d239cd94cf039ff49c3e96bda44c0b9d5ed5a80e48fd773bf1eb103de2bcf51184c9ec8c3c1f06c85f8f03a04472df1fa41
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
NONAME
C2
45.9.20.111:1355
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2496-118-0x00000000022D0000-0x0000000002304000-memory.dmp family_redline behavioral1/memory/2496-120-0x00000000026B0000-0x00000000026E2000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
586f15235b0f2277a2cb82fd96261e4167c3e2ca7c2c34bd30165bbd38537e6f.exedescription pid process Token: SeDebugPrivilege 2496 586f15235b0f2277a2cb82fd96261e4167c3e2ca7c2c34bd30165bbd38537e6f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2496-115-0x00000000001D0000-0x00000000001FB000-memory.dmpFilesize
172KB
-
memory/2496-116-0x00000000007C0000-0x00000000007F9000-memory.dmpFilesize
228KB
-
memory/2496-117-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2496-118-0x00000000022D0000-0x0000000002304000-memory.dmpFilesize
208KB
-
memory/2496-119-0x0000000004C30000-0x000000000512E000-memory.dmpFilesize
5.0MB
-
memory/2496-120-0x00000000026B0000-0x00000000026E2000-memory.dmpFilesize
200KB
-
memory/2496-122-0x0000000004C22000-0x0000000004C23000-memory.dmpFilesize
4KB
-
memory/2496-121-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/2496-123-0x0000000004C23000-0x0000000004C24000-memory.dmpFilesize
4KB
-
memory/2496-124-0x0000000005130000-0x0000000005736000-memory.dmpFilesize
6.0MB
-
memory/2496-125-0x0000000004AD0000-0x0000000004AE2000-memory.dmpFilesize
72KB
-
memory/2496-126-0x0000000004B00000-0x0000000004C0A000-memory.dmpFilesize
1.0MB
-
memory/2496-127-0x0000000005770000-0x00000000057AE000-memory.dmpFilesize
248KB
-
memory/2496-128-0x00000000057C0000-0x000000000580B000-memory.dmpFilesize
300KB
-
memory/2496-129-0x0000000004C24000-0x0000000004C26000-memory.dmpFilesize
8KB