Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 05:15
Static task
static1
Behavioral task
behavioral1
Sample
e98b53b42262de44b263e2620f8e08028692877251766e44b9f1127a35b4685f.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
e98b53b42262de44b263e2620f8e08028692877251766e44b9f1127a35b4685f.exe
-
Size
458KB
-
MD5
221385ea066e800055c7f7e3260a40ff
-
SHA1
92523ed4a03dbae71a18bf9dfb551a9aea0edd3d
-
SHA256
e98b53b42262de44b263e2620f8e08028692877251766e44b9f1127a35b4685f
-
SHA512
6341702a1ccc629c7d8576d84a578c43543d0cbc7311a7e719bea0003c8aa4dd65d6e987cd13365f892cea85ff2df1885efe6de24d9477647e9db525da2a39ed
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
ruzkiKAKOYTO
C2
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2224-118-0x0000000002310000-0x0000000002344000-memory.dmp family_redline behavioral1/memory/2224-123-0x0000000002470000-0x00000000024A2000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e98b53b42262de44b263e2620f8e08028692877251766e44b9f1127a35b4685f.exedescription pid process Token: SeDebugPrivilege 2224 e98b53b42262de44b263e2620f8e08028692877251766e44b9f1127a35b4685f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2224-115-0x0000000000480000-0x000000000052E000-memory.dmpFilesize
696KB
-
memory/2224-116-0x0000000000480000-0x000000000052E000-memory.dmpFilesize
696KB
-
memory/2224-117-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/2224-118-0x0000000002310000-0x0000000002344000-memory.dmpFilesize
208KB
-
memory/2224-120-0x0000000004CE2000-0x0000000004CE3000-memory.dmpFilesize
4KB
-
memory/2224-119-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/2224-121-0x0000000004CE3000-0x0000000004CE4000-memory.dmpFilesize
4KB
-
memory/2224-122-0x0000000004CF0000-0x00000000051EE000-memory.dmpFilesize
5.0MB
-
memory/2224-123-0x0000000002470000-0x00000000024A2000-memory.dmpFilesize
200KB
-
memory/2224-124-0x0000000005800000-0x0000000005E06000-memory.dmpFilesize
6.0MB
-
memory/2224-125-0x0000000002680000-0x0000000002692000-memory.dmpFilesize
72KB
-
memory/2224-126-0x0000000004B50000-0x0000000004C5A000-memory.dmpFilesize
1.0MB
-
memory/2224-127-0x0000000004C60000-0x0000000004C9E000-memory.dmpFilesize
248KB
-
memory/2224-128-0x0000000004CE4000-0x0000000004CE6000-memory.dmpFilesize
8KB
-
memory/2224-129-0x00000000051F0000-0x000000000523B000-memory.dmpFilesize
300KB