Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 19:56
Static task
static1
Behavioral task
behavioral1
Sample
ebb86bff468a3b482b724efc18a226b5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ebb86bff468a3b482b724efc18a226b5.exe
Resource
win10-en-20211208
General
-
Target
ebb86bff468a3b482b724efc18a226b5.exe
-
Size
599KB
-
MD5
ebb86bff468a3b482b724efc18a226b5
-
SHA1
8e9d5f32146bb17b56c9cdd61023ace27982c44c
-
SHA256
677b8d2a671f9f2de4e110adaf6eb12f74c9feb15dcd9e6e6c126f668676cf57
-
SHA512
a49113e697b58d300b9404b5b5a046240b185c38242c78ac7f26891976915e92439ff8ec636af4c2bad5b0015574c21ea518db10918bc2cf843afdde713854c7
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1460-57-0x0000000000120000-0x0000000000194000-memory.dmp family_redline behavioral1/memory/1460-65-0x0000000000120000-0x0000000000194000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
ebb86bff468a3b482b724efc18a226b5.exepid process 1460 ebb86bff468a3b482b724efc18a226b5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ebb86bff468a3b482b724efc18a226b5.exepid process 1460 ebb86bff468a3b482b724efc18a226b5.exe 1460 ebb86bff468a3b482b724efc18a226b5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ebb86bff468a3b482b724efc18a226b5.exedescription pid process Token: SeDebugPrivilege 1460 ebb86bff468a3b482b724efc18a226b5.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1460-54-0x0000000075431000-0x0000000075433000-memory.dmpFilesize
8KB
-
memory/1460-55-0x00000000003D0000-0x0000000000415000-memory.dmpFilesize
276KB
-
memory/1460-56-0x0000000074DE0000-0x0000000074E2A000-memory.dmpFilesize
296KB
-
memory/1460-58-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1460-57-0x0000000000120000-0x0000000000194000-memory.dmpFilesize
464KB
-
memory/1460-60-0x00000000767C0000-0x000000007686C000-memory.dmpFilesize
688KB
-
memory/1460-61-0x0000000076E90000-0x0000000076ED7000-memory.dmpFilesize
284KB
-
memory/1460-62-0x0000000076E10000-0x0000000076E67000-memory.dmpFilesize
348KB
-
memory/1460-64-0x0000000075060000-0x00000000751BC000-memory.dmpFilesize
1.4MB
-
memory/1460-65-0x0000000000120000-0x0000000000194000-memory.dmpFilesize
464KB
-
memory/1460-66-0x00000000763F0000-0x000000007647F000-memory.dmpFilesize
572KB
-
memory/1460-68-0x0000000002910000-0x0000000002911000-memory.dmpFilesize
4KB
-
memory/1460-69-0x0000000075430000-0x000000007607A000-memory.dmpFilesize
12.3MB
-
memory/1460-70-0x0000000073A30000-0x0000000073A47000-memory.dmpFilesize
92KB
-
memory/1460-71-0x00000000761B0000-0x00000000761E5000-memory.dmpFilesize
212KB
-
memory/1460-72-0x000000006AC50000-0x000000006ADE0000-memory.dmpFilesize
1.6MB
-
memory/1460-73-0x000000006AB30000-0x000000006AB47000-memory.dmpFilesize
92KB