Analysis

  • max time kernel
    111s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    01-02-2022 06:18

General

  • Target

    820064bdfd510533740acb1c3581e5e84dcb569be71d78d2466b9dd07a9aea4b.exe

  • Size

    417KB

  • MD5

    29000cdee103dda9642a2d13f64df87b

  • SHA1

    0677a71ae3012570a99f3d29208a151c22f351cc

  • SHA256

    820064bdfd510533740acb1c3581e5e84dcb569be71d78d2466b9dd07a9aea4b

  • SHA512

    a4cc92b0989be5555bf5325b8cbe7b14e686d7cad3fae52c186f54b3fb51c0e2a9289ca986ee68cf8c10bf20f7e801a4efa1bff76d6e34c13eeee3da4167a89b

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\820064bdfd510533740acb1c3581e5e84dcb569be71d78d2466b9dd07a9aea4b.exe
    "C:\Users\Admin\AppData\Local\Temp\820064bdfd510533740acb1c3581e5e84dcb569be71d78d2466b9dd07a9aea4b.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3132

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3132-119-0x00000000020E0000-0x0000000002119000-memory.dmp
    Filesize

    228KB

  • memory/3132-120-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/3132-121-0x00000000022E0000-0x0000000002314000-memory.dmp
    Filesize

    208KB

  • memory/3132-124-0x0000000002283000-0x0000000002284000-memory.dmp
    Filesize

    4KB

  • memory/3132-123-0x0000000002282000-0x0000000002283000-memory.dmp
    Filesize

    4KB

  • memory/3132-122-0x0000000002280000-0x0000000002281000-memory.dmp
    Filesize

    4KB

  • memory/3132-125-0x0000000004A60000-0x0000000004F5E000-memory.dmp
    Filesize

    5.0MB

  • memory/3132-126-0x00000000023F0000-0x0000000002422000-memory.dmp
    Filesize

    200KB

  • memory/3132-127-0x0000000004F60000-0x0000000005566000-memory.dmp
    Filesize

    6.0MB

  • memory/3132-128-0x00000000055F0000-0x0000000005602000-memory.dmp
    Filesize

    72KB

  • memory/3132-129-0x0000000005620000-0x000000000572A000-memory.dmp
    Filesize

    1.0MB

  • memory/3132-130-0x0000000002284000-0x0000000002286000-memory.dmp
    Filesize

    8KB

  • memory/3132-131-0x00000000057B0000-0x00000000057EE000-memory.dmp
    Filesize

    248KB

  • memory/3132-132-0x00000000057F0000-0x000000000583B000-memory.dmp
    Filesize

    300KB

  • memory/3132-133-0x0000000005A60000-0x0000000005AD6000-memory.dmp
    Filesize

    472KB

  • memory/3132-134-0x0000000005B50000-0x0000000005BE2000-memory.dmp
    Filesize

    584KB

  • memory/3132-135-0x0000000005B20000-0x0000000005B3E000-memory.dmp
    Filesize

    120KB

  • memory/3132-136-0x0000000005DA0000-0x0000000005E06000-memory.dmp
    Filesize

    408KB

  • memory/3132-137-0x0000000006490000-0x0000000006652000-memory.dmp
    Filesize

    1.8MB

  • memory/3132-138-0x0000000006660000-0x0000000006B8C000-memory.dmp
    Filesize

    5.2MB