Analysis
-
max time kernel
123s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-01-2022 17:36
Static task
static1
Behavioral task
behavioral1
Sample
c36a7de7c2857e901d1fc1c0af9f6682.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c36a7de7c2857e901d1fc1c0af9f6682.exe
Resource
win10-en-20211208
General
-
Target
c36a7de7c2857e901d1fc1c0af9f6682.exe
-
Size
888KB
-
MD5
c36a7de7c2857e901d1fc1c0af9f6682
-
SHA1
414740b4583f033d48c64b6494680d8c031a4632
-
SHA256
b5a4254a37a9af864bb7f3ed14fd67b704b652e9a959cf5e6fabeeeb8cf6174a
-
SHA512
664926d78e7360dc3309e62849a3799f511510fea4d241b5972e00e8e3e7c324b4100c5ec56a98d42d4cb24fa3c146bf472e8eda73c12bdc517e0abfdc076994
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3704-119-0x0000000000BC0000-0x0000000000C9D000-memory.dmp family_redline behavioral2/memory/3704-120-0x0000000000BC0000-0x0000000000C9D000-memory.dmp family_redline behavioral2/memory/3704-124-0x0000000000BC0000-0x0000000000C9D000-memory.dmp family_redline behavioral2/memory/3704-125-0x0000000000BC0000-0x0000000000C9D000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
c36a7de7c2857e901d1fc1c0af9f6682.exepid process 3704 c36a7de7c2857e901d1fc1c0af9f6682.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
c36a7de7c2857e901d1fc1c0af9f6682.exepid process 3704 c36a7de7c2857e901d1fc1c0af9f6682.exe 3704 c36a7de7c2857e901d1fc1c0af9f6682.exe 3704 c36a7de7c2857e901d1fc1c0af9f6682.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c36a7de7c2857e901d1fc1c0af9f6682.exedescription pid process Token: SeDebugPrivilege 3704 c36a7de7c2857e901d1fc1c0af9f6682.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3704-118-0x0000000002EA0000-0x0000000002EE4000-memory.dmpFilesize
272KB
-
memory/3704-119-0x0000000000BC0000-0x0000000000C9D000-memory.dmpFilesize
884KB
-
memory/3704-120-0x0000000000BC0000-0x0000000000C9D000-memory.dmpFilesize
884KB
-
memory/3704-121-0x0000000000DB0000-0x0000000000DB1000-memory.dmpFilesize
4KB
-
memory/3704-122-0x00000000766E0000-0x00000000768A2000-memory.dmpFilesize
1.8MB
-
memory/3704-123-0x00000000764E0000-0x00000000765D1000-memory.dmpFilesize
964KB
-
memory/3704-124-0x0000000000BC0000-0x0000000000C9D000-memory.dmpFilesize
884KB
-
memory/3704-125-0x0000000000BC0000-0x0000000000C9D000-memory.dmpFilesize
884KB
-
memory/3704-126-0x0000000071CD0000-0x0000000071D50000-memory.dmpFilesize
512KB
-
memory/3704-128-0x0000000005FE0000-0x00000000065E6000-memory.dmpFilesize
6.0MB
-
memory/3704-127-0x00000000059C0000-0x00000000059C1000-memory.dmpFilesize
4KB
-
memory/3704-129-0x00000000031A0000-0x00000000031B2000-memory.dmpFilesize
72KB
-
memory/3704-130-0x0000000005AE0000-0x0000000005BEA000-memory.dmpFilesize
1.0MB
-
memory/3704-131-0x0000000005930000-0x000000000596E000-memory.dmpFilesize
248KB
-
memory/3704-132-0x0000000005DC0000-0x0000000005F82000-memory.dmpFilesize
1.8MB
-
memory/3704-133-0x00000000741F0000-0x0000000074774000-memory.dmpFilesize
5.5MB
-
memory/3704-134-0x0000000074F00000-0x0000000076248000-memory.dmpFilesize
19.3MB
-
memory/3704-135-0x00000000059D0000-0x0000000005A1B000-memory.dmpFilesize
300KB
-
memory/3704-136-0x000000006FF20000-0x000000006FF6B000-memory.dmpFilesize
300KB
-
memory/3704-137-0x0000000006CF0000-0x00000000071EE000-memory.dmpFilesize
5.0MB
-
memory/3704-138-0x0000000006860000-0x00000000068C6000-memory.dmpFilesize
408KB
-
memory/3704-139-0x0000000006950000-0x00000000069C6000-memory.dmpFilesize
472KB
-
memory/3704-140-0x0000000006A70000-0x0000000006B02000-memory.dmpFilesize
584KB
-
memory/3704-141-0x0000000005FC0000-0x0000000005FDE000-memory.dmpFilesize
120KB
-
memory/3704-142-0x0000000006C10000-0x0000000006C60000-memory.dmpFilesize
320KB
-
memory/3704-143-0x00000000085D0000-0x0000000008AFC000-memory.dmpFilesize
5.2MB