Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 09:31
Static task
static1
Behavioral task
behavioral1
Sample
488d80f57c640f09f3cc27ed6acc8a31.exe
Resource
win7-en-20211208
General
-
Target
488d80f57c640f09f3cc27ed6acc8a31.exe
-
Size
443KB
-
MD5
488d80f57c640f09f3cc27ed6acc8a31
-
SHA1
8b82803da61b9a524787daf45beda0c7ca1f3663
-
SHA256
8ecb54b5053ede30c8a1fbceaa3f174ea0e6dc30c93a6ceb72a42b5662acbdc8
-
SHA512
cdda2d71e60b2fd3689b4549708928f65d6ce6b25c4b30fdb9b3cd0647c6d2c226191f74fbfc0d2e1d4d654ed0325ce885bcf4a04e67d29198eb00d3110771c2
Malware Config
Extracted
redline
noname
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3500-116-0x0000000002560000-0x0000000002594000-memory.dmp family_redline behavioral2/memory/3500-118-0x00000000025E0000-0x0000000002612000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
488d80f57c640f09f3cc27ed6acc8a31.exedescription pid process Token: SeDebugPrivilege 3500 488d80f57c640f09f3cc27ed6acc8a31.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3500-115-0x0000000000850000-0x0000000000893000-memory.dmpFilesize
268KB
-
memory/3500-116-0x0000000002560000-0x0000000002594000-memory.dmpFilesize
208KB
-
memory/3500-117-0x0000000004B60000-0x000000000505E000-memory.dmpFilesize
5.0MB
-
memory/3500-118-0x00000000025E0000-0x0000000002612000-memory.dmpFilesize
200KB
-
memory/3500-119-0x00000000021F0000-0x0000000002229000-memory.dmpFilesize
228KB
-
memory/3500-120-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/3500-122-0x0000000002552000-0x0000000002553000-memory.dmpFilesize
4KB
-
memory/3500-121-0x0000000002550000-0x0000000002551000-memory.dmpFilesize
4KB
-
memory/3500-123-0x0000000002553000-0x0000000002554000-memory.dmpFilesize
4KB
-
memory/3500-124-0x00000000050A0000-0x00000000056A6000-memory.dmpFilesize
6.0MB
-
memory/3500-125-0x0000000005730000-0x0000000005742000-memory.dmpFilesize
72KB
-
memory/3500-126-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/3500-127-0x00000000058B0000-0x00000000058EE000-memory.dmpFilesize
248KB
-
memory/3500-128-0x0000000002530000-0x0000000002556000-memory.dmpFilesize
152KB
-
memory/3500-129-0x0000000005900000-0x000000000594B000-memory.dmpFilesize
300KB
-
memory/3500-130-0x0000000005AA0000-0x0000000005B16000-memory.dmpFilesize
472KB
-
memory/3500-131-0x0000000005B20000-0x0000000005BB2000-memory.dmpFilesize
584KB
-
memory/3500-132-0x0000000005E00000-0x0000000005E1E000-memory.dmpFilesize
120KB
-
memory/3500-133-0x0000000005E80000-0x0000000005EE6000-memory.dmpFilesize
408KB
-
memory/3500-134-0x00000000065B0000-0x0000000006772000-memory.dmpFilesize
1.8MB
-
memory/3500-135-0x0000000006780000-0x0000000006CAC000-memory.dmpFilesize
5.2MB