Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13-02-2022 13:20
Static task
static1
Behavioral task
behavioral1
Sample
9d31328e1cdeab2bb3f40bcf90829826518cad80cdca522018267bf0583778df.exe
Resource
win10-en-20211208
General
-
Target
9d31328e1cdeab2bb3f40bcf90829826518cad80cdca522018267bf0583778df.exe
-
Size
440KB
-
MD5
985200f2a157f985b944fe4932bce0ad
-
SHA1
e99e68c6aac7b75048f5bb01f0cb5cf44ed68d1a
-
SHA256
9d31328e1cdeab2bb3f40bcf90829826518cad80cdca522018267bf0583778df
-
SHA512
9ca896d66c755e030d87aaaff6f9e0c3e315676345039c3fb5e8526cc241d79d0f0f5ac16292aefc80b2026f42b7af3b45946ece4ce8c3c19f978c0692c6453c
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
-
auth_value
44e87155dd7a4d1957a956ed040ff3fd
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1496-119-0x0000000002A40000-0x0000000002A74000-memory.dmp family_redline behavioral1/memory/1496-121-0x0000000002A70000-0x0000000002AA2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9d31328e1cdeab2bb3f40bcf90829826518cad80cdca522018267bf0583778df.exedescription pid process Token: SeDebugPrivilege 1496 9d31328e1cdeab2bb3f40bcf90829826518cad80cdca522018267bf0583778df.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1496-114-0x00000000009EA000-0x0000000000A16000-memory.dmpFilesize
176KB
-
memory/1496-115-0x00000000009EA000-0x0000000000A16000-memory.dmpFilesize
176KB
-
memory/1496-116-0x00000000025B0000-0x00000000025E9000-memory.dmpFilesize
228KB
-
memory/1496-117-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1496-118-0x000000007319E000-0x000000007319F000-memory.dmpFilesize
4KB
-
memory/1496-119-0x0000000002A40000-0x0000000002A74000-memory.dmpFilesize
208KB
-
memory/1496-120-0x00000000050A0000-0x000000000559E000-memory.dmpFilesize
5.0MB
-
memory/1496-121-0x0000000002A70000-0x0000000002AA2000-memory.dmpFilesize
200KB
-
memory/1496-122-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/1496-123-0x0000000005092000-0x0000000005093000-memory.dmpFilesize
4KB
-
memory/1496-124-0x0000000005093000-0x0000000005094000-memory.dmpFilesize
4KB
-
memory/1496-125-0x00000000055A0000-0x0000000005BA6000-memory.dmpFilesize
6.0MB
-
memory/1496-126-0x0000000004FE0000-0x0000000004FF2000-memory.dmpFilesize
72KB
-
memory/1496-127-0x0000000005BB0000-0x0000000005CBA000-memory.dmpFilesize
1.0MB
-
memory/1496-128-0x0000000005050000-0x000000000508E000-memory.dmpFilesize
248KB
-
memory/1496-129-0x0000000005CD0000-0x0000000005D1B000-memory.dmpFilesize
300KB
-
memory/1496-130-0x0000000005094000-0x0000000005096000-memory.dmpFilesize
8KB
-
memory/1496-131-0x0000000005F70000-0x0000000005FD6000-memory.dmpFilesize
408KB
-
memory/1496-132-0x0000000006630000-0x00000000066A6000-memory.dmpFilesize
472KB
-
memory/1496-133-0x00000000066B0000-0x0000000006742000-memory.dmpFilesize
584KB
-
memory/1496-134-0x00000000068C0000-0x00000000068DE000-memory.dmpFilesize
120KB
-
memory/1496-135-0x00000000069F0000-0x0000000006BB2000-memory.dmpFilesize
1.8MB
-
memory/1496-136-0x0000000006BC0000-0x00000000070EC000-memory.dmpFilesize
5.2MB