Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 00:47
Static task
static1
Behavioral task
behavioral1
Sample
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe
Resource
win10v2004-en-20220113
General
-
Target
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe
-
Size
401KB
-
MD5
a9fa01f0aa6c18a5520e918303a91a10
-
SHA1
3f5ef40bfb1181c2944e8fa4ff44215c0831789c
-
SHA256
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8
-
SHA512
b008c6532ca8e93fc379b21aec4939133dfa1b289f4876a50d3c9f456d0391177ab5f4445cf642dc184eb0bd959e739a6d697950427077be914acbb5cf644ffc
Malware Config
Extracted
redline
Pablicher
45.9.20.247:11452
-
auth_value
d98cb5afc65a5d402a2e09ebd09bb93d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-54-0x0000000001ED0000-0x0000000001F04000-memory.dmp family_redline behavioral1/memory/1684-55-0x0000000002090000-0x00000000020C2000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exedescription pid process Token: SeDebugPrivilege 1684 be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1684-53-0x00000000006DB000-0x0000000000707000-memory.dmpFilesize
176KB
-
memory/1684-54-0x0000000001ED0000-0x0000000001F04000-memory.dmpFilesize
208KB
-
memory/1684-55-0x0000000002090000-0x00000000020C2000-memory.dmpFilesize
200KB
-
memory/1684-56-0x00000000006DB000-0x0000000000707000-memory.dmpFilesize
176KB
-
memory/1684-57-0x0000000000220000-0x0000000000259000-memory.dmpFilesize
228KB
-
memory/1684-58-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1684-59-0x0000000074AFE000-0x0000000074AFF000-memory.dmpFilesize
4KB
-
memory/1684-60-0x0000000004891000-0x0000000004892000-memory.dmpFilesize
4KB
-
memory/1684-62-0x0000000004893000-0x0000000004894000-memory.dmpFilesize
4KB
-
memory/1684-61-0x0000000004892000-0x0000000004893000-memory.dmpFilesize
4KB
-
memory/1684-63-0x0000000004894000-0x0000000004896000-memory.dmpFilesize
8KB