Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 14:06
Static task
static1
Behavioral task
behavioral1
Sample
a9b738007a4c425a4dafe2e90af02207.exe
Resource
win7-en-20211208
General
-
Target
a9b738007a4c425a4dafe2e90af02207.exe
-
Size
443KB
-
MD5
a9b738007a4c425a4dafe2e90af02207
-
SHA1
38826225afa929215e895ab1233bdd72c5887883
-
SHA256
834da6d982eabadc0518f149d8832f421d8d3c2943033ff19c1a84874b88148b
-
SHA512
3d46a844d6278d2532cc4bd1d29033bf0176e1314b9a8ef136942e294f6f76da641359c72cfd507a7358c9911a421136de31e70b2c367a717149e84adc194d75
Malware Config
Extracted
redline
noname
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/964-56-0x0000000002130000-0x0000000002164000-memory.dmp family_redline behavioral1/memory/964-57-0x0000000004730000-0x0000000004762000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a9b738007a4c425a4dafe2e90af02207.exedescription pid process Token: SeDebugPrivilege 964 a9b738007a4c425a4dafe2e90af02207.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/964-53-0x0000000000580000-0x00000000005C8000-memory.dmpFilesize
288KB
-
memory/964-54-0x0000000000220000-0x0000000000259000-memory.dmpFilesize
228KB
-
memory/964-55-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/964-56-0x0000000002130000-0x0000000002164000-memory.dmpFilesize
208KB
-
memory/964-57-0x0000000004730000-0x0000000004762000-memory.dmpFilesize
200KB
-
memory/964-59-0x00000000048D2000-0x00000000048D3000-memory.dmpFilesize
4KB
-
memory/964-58-0x00000000048D1000-0x00000000048D2000-memory.dmpFilesize
4KB
-
memory/964-60-0x00000000048D3000-0x00000000048D4000-memory.dmpFilesize
4KB
-
memory/964-61-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/964-62-0x00000000048D4000-0x00000000048D6000-memory.dmpFilesize
8KB