Analysis
-
max time kernel
119s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 23:51
Static task
static1
Behavioral task
behavioral1
Sample
74e73da05d3832514fd72cbf18a8278ccdfcb11d1367d773fa15b54a8ccc7e1c.exe
Resource
win10-en-20211208
General
-
Target
74e73da05d3832514fd72cbf18a8278ccdfcb11d1367d773fa15b54a8ccc7e1c.exe
-
Size
330KB
-
MD5
fe12c46431990e82c1e3ef52f6f5bc4b
-
SHA1
a2a2c06e26f12b4af4095a461ec8bd7eee8ba210
-
SHA256
74e73da05d3832514fd72cbf18a8278ccdfcb11d1367d773fa15b54a8ccc7e1c
-
SHA512
e3784a040efc54ff813ea4d0a6438e206c1ee65d541c3454ec85531c60580db760c320e95e6ceeb4007c0e87af2e85513fb3972fb9ecdfae5a3418702909b17a
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3932-118-0x00000000022F0000-0x0000000002324000-memory.dmp family_redline behavioral1/memory/3932-123-0x00000000025B0000-0x00000000025E2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
74e73da05d3832514fd72cbf18a8278ccdfcb11d1367d773fa15b54a8ccc7e1c.exedescription pid process Token: SeDebugPrivilege 3932 74e73da05d3832514fd72cbf18a8278ccdfcb11d1367d773fa15b54a8ccc7e1c.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3932-116-0x0000000000500000-0x00000000005AE000-memory.dmpFilesize
696KB
-
memory/3932-117-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3932-118-0x00000000022F0000-0x0000000002324000-memory.dmpFilesize
208KB
-
memory/3932-119-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/3932-120-0x0000000004D72000-0x0000000004D73000-memory.dmpFilesize
4KB
-
memory/3932-121-0x0000000004D73000-0x0000000004D74000-memory.dmpFilesize
4KB
-
memory/3932-122-0x0000000004D80000-0x000000000527E000-memory.dmpFilesize
5.0MB
-
memory/3932-123-0x00000000025B0000-0x00000000025E2000-memory.dmpFilesize
200KB
-
memory/3932-124-0x0000000005890000-0x0000000005E96000-memory.dmpFilesize
6.0MB
-
memory/3932-125-0x0000000004BD0000-0x0000000004BE2000-memory.dmpFilesize
72KB
-
memory/3932-126-0x0000000004C00000-0x0000000004D0A000-memory.dmpFilesize
1.0MB
-
memory/3932-127-0x0000000004D74000-0x0000000004D76000-memory.dmpFilesize
8KB
-
memory/3932-128-0x0000000005280000-0x00000000052BE000-memory.dmpFilesize
248KB
-
memory/3932-129-0x00000000053C0000-0x000000000540B000-memory.dmpFilesize
300KB
-
memory/3932-130-0x0000000005550000-0x00000000055C6000-memory.dmpFilesize
472KB
-
memory/3932-131-0x0000000005640000-0x00000000056D2000-memory.dmpFilesize
584KB
-
memory/3932-132-0x0000000005610000-0x000000000562E000-memory.dmpFilesize
120KB
-
memory/3932-133-0x0000000005EA0000-0x0000000005F06000-memory.dmpFilesize
408KB
-
memory/3932-134-0x0000000006570000-0x0000000006732000-memory.dmpFilesize
1.8MB
-
memory/3932-135-0x0000000006740000-0x0000000006C6C000-memory.dmpFilesize
5.2MB