Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb.exe
-
Size
457KB
-
MD5
26be3c0c5533ffdfd776e8798d9f624b
-
SHA1
b7015b77ac7580e7589fe09807730993f049bab7
-
SHA256
8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb
-
SHA512
b6b4d121944a0f721bb5a83892020c190263f2b9222fc1151db5279922b646289d6a664500d662328af368ffcdcc3f01ce443f7d23cc9dfbbc72dc511090b59a
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
noname
C2
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2736-121-0x0000000002320000-0x0000000002354000-memory.dmp family_redline behavioral1/memory/2736-123-0x00000000024C0000-0x00000000024F2000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb.exedescription pid process Token: SeDebugPrivilege 2736 8978ac77fcf0acbcfd44eef20ffad25b3a168fedc926f6f729060ae33c0bccdb.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2736-118-0x0000000000480000-0x00000000005CA000-memory.dmpFilesize
1.3MB
-
memory/2736-119-0x00000000005F0000-0x0000000000629000-memory.dmpFilesize
228KB
-
memory/2736-120-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/2736-121-0x0000000002320000-0x0000000002354000-memory.dmpFilesize
208KB
-
memory/2736-122-0x0000000004C90000-0x000000000518E000-memory.dmpFilesize
5.0MB
-
memory/2736-123-0x00000000024C0000-0x00000000024F2000-memory.dmpFilesize
200KB
-
memory/2736-124-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/2736-125-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/2736-126-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/2736-127-0x0000000005190000-0x0000000005796000-memory.dmpFilesize
6.0MB
-
memory/2736-128-0x00000000027E0000-0x00000000027F2000-memory.dmpFilesize
72KB
-
memory/2736-129-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/2736-130-0x00000000058C0000-0x00000000058FE000-memory.dmpFilesize
248KB
-
memory/2736-131-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/2736-132-0x0000000005910000-0x000000000595B000-memory.dmpFilesize
300KB