Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 19:58
Static task
static1
Behavioral task
behavioral1
Sample
342b4b0de1fa80c2874efa4cee6b29ed.exe
Resource
win7-en-20211208
General
-
Target
342b4b0de1fa80c2874efa4cee6b29ed.exe
-
Size
385KB
-
MD5
342b4b0de1fa80c2874efa4cee6b29ed
-
SHA1
ff00df0fae10b85e0e9fc50ad5684cc6ad897466
-
SHA256
1f9c5d031cd548540a3b67892bb36e474ae0f117cb8ceb5f4ce1295f0a700615
-
SHA512
25eaaa6616ff57f30d4558739762077b325048367a1f086ef3383b4800056c04a69b950fb0b6765cbfab8a078dd1f77159adca9bbb8f656214bda0172cee536e
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
-
auth_value
44e87155dd7a4d1957a956ed040ff3fd
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1088-54-0x00000000033B0000-0x00000000033E4000-memory.dmp family_redline behavioral1/memory/1088-62-0x0000000003440000-0x0000000003472000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
342b4b0de1fa80c2874efa4cee6b29ed.exedescription pid process Token: SeDebugPrivilege 1088 342b4b0de1fa80c2874efa4cee6b29ed.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1088-54-0x00000000033B0000-0x00000000033E4000-memory.dmpFilesize
208KB
-
memory/1088-55-0x0000000000220000-0x000000000024B000-memory.dmpFilesize
172KB
-
memory/1088-56-0x0000000000250000-0x0000000000289000-memory.dmpFilesize
228KB
-
memory/1088-60-0x0000000005D62000-0x0000000005D63000-memory.dmpFilesize
4KB
-
memory/1088-59-0x0000000005D61000-0x0000000005D62000-memory.dmpFilesize
4KB
-
memory/1088-58-0x000000007435E000-0x000000007435F000-memory.dmpFilesize
4KB
-
memory/1088-57-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1088-61-0x0000000005D63000-0x0000000005D64000-memory.dmpFilesize
4KB
-
memory/1088-62-0x0000000003440000-0x0000000003472000-memory.dmpFilesize
200KB
-
memory/1088-63-0x0000000005D64000-0x0000000005D66000-memory.dmpFilesize
8KB