Analysis
-
max time kernel
157s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
31-03-2022 07:12
Behavioral task
behavioral1
Sample
1072-346-0x0000000000B40000-0x0000000000B5E000-memory.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1072-346-0x0000000000B40000-0x0000000000B5E000-memory.exe
Resource
win10v2004-en-20220113
General
-
Target
1072-346-0x0000000000B40000-0x0000000000B5E000-memory.exe
-
Size
100KB
-
MD5
f5a1b24375919b6a5778001215a70c96
-
SHA1
e3d2f0222ec356d0f33c9d53c91fde2332798937
-
SHA256
af1bf92b6b65c6387c20ff3a7e3d20985f746f6af37817891d33260b1d86910e
-
SHA512
693384881cbf5327238ea1eb38d048e135760f412a6fe217f9386d7a2cfeb0189e87d1b628289901f9dc0cc3a68e3f5ba1c594984a7fa5d7f4537343de5c10ab
Malware Config
Extracted
redline
Cana01
176.111.174.254:56328
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/216-133-0x00000000003A0000-0x00000000003BE000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1072-346-0x0000000000B40000-0x0000000000B5E000-memory.exedescription pid process Token: SeDebugPrivilege 216 1072-346-0x0000000000B40000-0x0000000000B5E000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/216-133-0x00000000003A0000-0x00000000003BE000-memory.dmpFilesize
120KB
-
memory/216-134-0x0000000005370000-0x0000000005988000-memory.dmpFilesize
6.1MB
-
memory/216-135-0x00000000029D0000-0x00000000029E2000-memory.dmpFilesize
72KB
-
memory/216-136-0x0000000004D90000-0x0000000004DCC000-memory.dmpFilesize
240KB
-
memory/216-137-0x0000000005040000-0x000000000514A000-memory.dmpFilesize
1.0MB