Analysis
-
max time kernel
163s -
max time network
159s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-02-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
177e08a52ca6fb33c7e3212d8b996e6cae953503a742ad9e5b2380321277e541.exe
Resource
win10-en-20211208
General
-
Target
177e08a52ca6fb33c7e3212d8b996e6cae953503a742ad9e5b2380321277e541.exe
-
Size
385KB
-
MD5
2561e301076b5c7f9e90d27547355891
-
SHA1
46a53cabf3fa4b3179077fa0834d42cdbf524fbd
-
SHA256
177e08a52ca6fb33c7e3212d8b996e6cae953503a742ad9e5b2380321277e541
-
SHA512
06ac1eb9de24f1ed1549642566edd458cc7ac19701023f4fa8c69729ccb2dba566757376e5465e6ea3d58b03542c678721ec9aff1267268dcce9718e21d021a8
Malware Config
Extracted
redline
noname
185.215.113.29:20819
-
auth_value
ee92d883673b7156fdd66cac5fc8d2d0
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/5112-120-0x00000000038F0000-0x0000000003924000-memory.dmp family_redline behavioral1/memory/5112-124-0x0000000003B60000-0x0000000003B92000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
177e08a52ca6fb33c7e3212d8b996e6cae953503a742ad9e5b2380321277e541.exedescription pid process Token: SeDebugPrivilege 5112 177e08a52ca6fb33c7e3212d8b996e6cae953503a742ad9e5b2380321277e541.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5112-115-0x0000000003650000-0x000000000367B000-memory.dmpFilesize
172KB
-
memory/5112-116-0x0000000003680000-0x00000000036B9000-memory.dmpFilesize
228KB
-
memory/5112-117-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/5112-118-0x00000000730FE000-0x00000000730FF000-memory.dmpFilesize
4KB
-
memory/5112-119-0x0000000006050000-0x0000000006051000-memory.dmpFilesize
4KB
-
memory/5112-120-0x00000000038F0000-0x0000000003924000-memory.dmpFilesize
208KB
-
memory/5112-121-0x0000000006052000-0x0000000006053000-memory.dmpFilesize
4KB
-
memory/5112-122-0x0000000006053000-0x0000000006054000-memory.dmpFilesize
4KB
-
memory/5112-123-0x0000000006060000-0x000000000655E000-memory.dmpFilesize
5.0MB
-
memory/5112-124-0x0000000003B60000-0x0000000003B92000-memory.dmpFilesize
200KB
-
memory/5112-125-0x00000000067F0000-0x0000000006DF6000-memory.dmpFilesize
6.0MB
-
memory/5112-126-0x0000000006E80000-0x0000000006E92000-memory.dmpFilesize
72KB
-
memory/5112-127-0x0000000006EB0000-0x0000000006FBA000-memory.dmpFilesize
1.0MB
-
memory/5112-128-0x0000000006054000-0x0000000006056000-memory.dmpFilesize
8KB
-
memory/5112-129-0x0000000001A10000-0x0000000001A4E000-memory.dmpFilesize
248KB
-
memory/5112-130-0x0000000001DF0000-0x0000000001E3B000-memory.dmpFilesize
300KB
-
memory/5112-131-0x0000000001C00000-0x0000000001C66000-memory.dmpFilesize
408KB
-
memory/5112-132-0x0000000007490000-0x0000000007506000-memory.dmpFilesize
472KB
-
memory/5112-133-0x0000000007550000-0x00000000075E2000-memory.dmpFilesize
584KB