Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    27-01-2022 08:19

General

  • Target

    798ac3d31c8c61c28e15a2bc07461192858f4cb561aed81264f8582d88d1278b.exe

  • Size

    381KB

  • MD5

    fcfc15aaa60f99f62ab6ac448ab9ef4b

  • SHA1

    fd077a7afb2442adca5243435b7c65b7babb22e8

  • SHA256

    798ac3d31c8c61c28e15a2bc07461192858f4cb561aed81264f8582d88d1278b

  • SHA512

    66e1ae281670451b94b3660666e239d78809bf99db03bd9a6f1548a414c363aab248eedf93d91c65bee8a1fd0c8d7c840b8bc89e200d5bb9ef37767285650618

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\798ac3d31c8c61c28e15a2bc07461192858f4cb561aed81264f8582d88d1278b.exe
    "C:\Users\Admin\AppData\Local\Temp\798ac3d31c8c61c28e15a2bc07461192858f4cb561aed81264f8582d88d1278b.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3448

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3448-115-0x00000000007E0000-0x0000000000827000-memory.dmp
    Filesize

    284KB

  • memory/3448-116-0x0000000002220000-0x0000000002254000-memory.dmp
    Filesize

    208KB

  • memory/3448-117-0x0000000004E20000-0x000000000531E000-memory.dmp
    Filesize

    5.0MB

  • memory/3448-118-0x00000000025C0000-0x00000000025F2000-memory.dmp
    Filesize

    200KB

  • memory/3448-119-0x0000000000470000-0x00000000005BA000-memory.dmp
    Filesize

    1.3MB

  • memory/3448-121-0x0000000005320000-0x0000000005926000-memory.dmp
    Filesize

    6.0MB

  • memory/3448-123-0x0000000004E12000-0x0000000004E13000-memory.dmp
    Filesize

    4KB

  • memory/3448-125-0x0000000002690000-0x00000000026A2000-memory.dmp
    Filesize

    72KB

  • memory/3448-124-0x0000000004E13000-0x0000000004E14000-memory.dmp
    Filesize

    4KB

  • memory/3448-120-0x0000000000400000-0x0000000000465000-memory.dmp
    Filesize

    404KB

  • memory/3448-122-0x0000000004E10000-0x0000000004E11000-memory.dmp
    Filesize

    4KB

  • memory/3448-126-0x0000000004C40000-0x0000000004D4A000-memory.dmp
    Filesize

    1.0MB

  • memory/3448-127-0x0000000004D60000-0x0000000004D9E000-memory.dmp
    Filesize

    248KB

  • memory/3448-128-0x0000000004DB0000-0x0000000004DFB000-memory.dmp
    Filesize

    300KB

  • memory/3448-129-0x0000000004E14000-0x0000000004E16000-memory.dmp
    Filesize

    8KB

  • memory/3448-130-0x0000000005B70000-0x0000000005BE6000-memory.dmp
    Filesize

    472KB

  • memory/3448-131-0x0000000005C60000-0x0000000005CF2000-memory.dmp
    Filesize

    584KB

  • memory/3448-132-0x0000000005C30000-0x0000000005C4E000-memory.dmp
    Filesize

    120KB

  • memory/3448-133-0x0000000005E70000-0x0000000005ED6000-memory.dmp
    Filesize

    408KB

  • memory/3448-134-0x00000000065A0000-0x0000000006762000-memory.dmp
    Filesize

    1.8MB

  • memory/3448-135-0x0000000006770000-0x0000000006C9C000-memory.dmp
    Filesize

    5.2MB