Analysis

  • max time kernel
    79s
  • max time network
    79s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    12-02-2022 16:39

General

  • Target

    8e67b4fad1d9d55a8d3a6475dc7da0f12ee47b985070946bcb6ed5fff5092c69.exe

  • Size

    384KB

  • MD5

    48a5c31d9c1cdc1e6e4e2af9a9b97993

  • SHA1

    4184228c9d7fa4960dc716ef69e96d1ad4cfa1ee

  • SHA256

    8e67b4fad1d9d55a8d3a6475dc7da0f12ee47b985070946bcb6ed5fff5092c69

  • SHA512

    84a614fbf513b486bb7e096d65bc9e4bd43dca010fff14e94295cda0ed828ef28f0854a30a5efaecf8b4297aa678a78d9e2d9fcbcaed6433c312cca7d878e755

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Attributes
  • auth_value

    ee92d883673b7156fdd66cac5fc8d2d0

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e67b4fad1d9d55a8d3a6475dc7da0f12ee47b985070946bcb6ed5fff5092c69.exe
    "C:\Users\Admin\AppData\Local\Temp\8e67b4fad1d9d55a8d3a6475dc7da0f12ee47b985070946bcb6ed5fff5092c69.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5108

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5108-115-0x0000000003510000-0x000000000353B000-memory.dmp
    Filesize

    172KB

  • memory/5108-116-0x0000000003540000-0x0000000003579000-memory.dmp
    Filesize

    228KB

  • memory/5108-117-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/5108-118-0x00000000730FE000-0x00000000730FF000-memory.dmp
    Filesize

    4KB

  • memory/5108-119-0x0000000003810000-0x0000000003844000-memory.dmp
    Filesize

    208KB

  • memory/5108-120-0x0000000006290000-0x000000000678E000-memory.dmp
    Filesize

    5.0MB

  • memory/5108-121-0x00000000039D0000-0x0000000003A02000-memory.dmp
    Filesize

    200KB

  • memory/5108-123-0x0000000006282000-0x0000000006283000-memory.dmp
    Filesize

    4KB

  • memory/5108-122-0x0000000006280000-0x0000000006281000-memory.dmp
    Filesize

    4KB

  • memory/5108-124-0x0000000006283000-0x0000000006284000-memory.dmp
    Filesize

    4KB

  • memory/5108-125-0x0000000006790000-0x0000000006D96000-memory.dmp
    Filesize

    6.0MB

  • memory/5108-126-0x0000000003C80000-0x0000000003C92000-memory.dmp
    Filesize

    72KB

  • memory/5108-127-0x0000000006130000-0x000000000623A000-memory.dmp
    Filesize

    1.0MB

  • memory/5108-128-0x0000000006DA0000-0x0000000006DDE000-memory.dmp
    Filesize

    248KB

  • memory/5108-129-0x0000000006284000-0x0000000006286000-memory.dmp
    Filesize

    8KB

  • memory/5108-130-0x0000000006DE0000-0x0000000006E2B000-memory.dmp
    Filesize

    300KB

  • memory/5108-131-0x0000000007060000-0x00000000070D6000-memory.dmp
    Filesize

    472KB

  • memory/5108-132-0x00000000070E0000-0x0000000007172000-memory.dmp
    Filesize

    584KB

  • memory/5108-133-0x00000000072C0000-0x00000000072DE000-memory.dmp
    Filesize

    120KB

  • memory/5108-134-0x0000000007340000-0x00000000073A6000-memory.dmp
    Filesize

    408KB

  • memory/5108-135-0x0000000007A70000-0x0000000007C32000-memory.dmp
    Filesize

    1.8MB

  • memory/5108-136-0x0000000007C50000-0x000000000817C000-memory.dmp
    Filesize

    5.2MB