Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    26-01-2022 12:21

General

  • Target

    2cca70300e75df503f6676803b470383.exe

  • Size

    444KB

  • MD5

    2cca70300e75df503f6676803b470383

  • SHA1

    7de77087c0dd09612acb8aa97025c9aa495e64f3

  • SHA256

    191cfad3f68bdedbad3b6840e8d93ba5bb2566717de801264684c679340df950

  • SHA512

    a0def3aba2baaff74eb4e98e399ad053d81929a7d8a45c954cc0aacfe86c8b411cabcdc823f543859c059c53abe874ba13d3a5cb5ba56007eb619fa55c538126

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cca70300e75df503f6676803b470383.exe
    "C:\Users\Admin\AppData\Local\Temp\2cca70300e75df503f6676803b470383.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1528-54-0x0000000000270000-0x00000000002BA000-memory.dmp

    Filesize

    296KB

  • memory/1528-55-0x0000000002000000-0x0000000002034000-memory.dmp

    Filesize

    208KB

  • memory/1528-56-0x00000000004A0000-0x00000000004D9000-memory.dmp

    Filesize

    228KB

  • memory/1528-57-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1528-59-0x00000000048D2000-0x00000000048D3000-memory.dmp

    Filesize

    4KB

  • memory/1528-58-0x00000000048D1000-0x00000000048D2000-memory.dmp

    Filesize

    4KB

  • memory/1528-60-0x00000000048D3000-0x00000000048D4000-memory.dmp

    Filesize

    4KB

  • memory/1528-61-0x0000000002040000-0x0000000002072000-memory.dmp

    Filesize

    200KB

  • memory/1528-62-0x00000000766D1000-0x00000000766D3000-memory.dmp

    Filesize

    8KB

  • memory/1528-63-0x00000000048D4000-0x00000000048D6000-memory.dmp

    Filesize

    8KB