Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 13:23
Static task
static1
General
-
Target
834da6d982eabadc0518f149d8832f421d8d3c2943033ff19c1a84874b88148b.exe
-
Size
443KB
-
MD5
a9b738007a4c425a4dafe2e90af02207
-
SHA1
38826225afa929215e895ab1233bdd72c5887883
-
SHA256
834da6d982eabadc0518f149d8832f421d8d3c2943033ff19c1a84874b88148b
-
SHA512
3d46a844d6278d2532cc4bd1d29033bf0176e1314b9a8ef136942e294f6f76da641359c72cfd507a7358c9911a421136de31e70b2c367a717149e84adc194d75
Malware Config
Extracted
redline
noname
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2696-117-0x0000000002470000-0x00000000024A4000-memory.dmp family_redline behavioral1/memory/2696-119-0x0000000002510000-0x0000000002542000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
834da6d982eabadc0518f149d8832f421d8d3c2943033ff19c1a84874b88148b.exedescription pid process Token: SeDebugPrivilege 2696 834da6d982eabadc0518f149d8832f421d8d3c2943033ff19c1a84874b88148b.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2696-115-0x0000000000618000-0x0000000000644000-memory.dmpFilesize
176KB
-
memory/2696-116-0x00000000021B0000-0x00000000021E9000-memory.dmpFilesize
228KB
-
memory/2696-117-0x0000000002470000-0x00000000024A4000-memory.dmpFilesize
208KB
-
memory/2696-118-0x0000000004CB0000-0x00000000051AE000-memory.dmpFilesize
5.0MB
-
memory/2696-119-0x0000000002510000-0x0000000002542000-memory.dmpFilesize
200KB
-
memory/2696-120-0x00000000051B0000-0x00000000057B6000-memory.dmpFilesize
6.0MB
-
memory/2696-121-0x0000000004C10000-0x0000000004C22000-memory.dmpFilesize
72KB
-
memory/2696-122-0x00000000057C0000-0x00000000058CA000-memory.dmpFilesize
1.0MB
-
memory/2696-123-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/2696-124-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/2696-125-0x0000000004CA4000-0x0000000004CA6000-memory.dmpFilesize
8KB
-
memory/2696-126-0x0000000004CA2000-0x0000000004CA3000-memory.dmpFilesize
4KB
-
memory/2696-127-0x0000000004CA3000-0x0000000004CA4000-memory.dmpFilesize
4KB
-
memory/2696-128-0x00000000058D0000-0x000000000590E000-memory.dmpFilesize
248KB
-
memory/2696-129-0x0000000005910000-0x000000000595B000-memory.dmpFilesize
300KB
-
memory/2696-130-0x0000000005BA0000-0x0000000005C16000-memory.dmpFilesize
472KB
-
memory/2696-131-0x0000000005C90000-0x0000000005D22000-memory.dmpFilesize
584KB
-
memory/2696-132-0x0000000005C60000-0x0000000005C7E000-memory.dmpFilesize
120KB
-
memory/2696-133-0x0000000005EA0000-0x0000000005F06000-memory.dmpFilesize
408KB
-
memory/2696-134-0x00000000066F0000-0x00000000068B2000-memory.dmpFilesize
1.8MB
-
memory/2696-135-0x00000000068E0000-0x0000000006E0C000-memory.dmpFilesize
5.2MB