Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
31-03-2022 14:23
Static task
static1
Behavioral task
behavioral1
Sample
RQF #00811-AL WASL .exe
Resource
win7-20220311-en
General
-
Target
RQF #00811-AL WASL .exe
-
Size
721KB
-
MD5
3f8326ef5a02e2b20b6692ed3a4153ce
-
SHA1
5fa01330c418fc54fd57481f60a32eece6caa456
-
SHA256
aa7e5c5ab042b539c1ccaebe7c129bb54da0731be955dcfa328324ca776e3b01
-
SHA512
aabc56ae6c531c3402a4b399a9682eca99ff1198d1e8bbbdc2dfb201aed55d3036448af819363d38aaefd8674838969c7149e5821009759ecbf95c9269f6c6f3
Malware Config
Extracted
redline
jd
96.47.234.207:15286
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1132-134-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
RQF #00811-AL WASL .exedescription pid process target process PID 2924 set thread context of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
RQF #00811-AL WASL .exeRQF #00811-AL WASL .exepid process 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 2924 RQF #00811-AL WASL .exe 1132 RQF #00811-AL WASL .exe 1132 RQF #00811-AL WASL .exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RQF #00811-AL WASL .exeRQF #00811-AL WASL .exedescription pid process Token: SeDebugPrivilege 2924 RQF #00811-AL WASL .exe Token: SeDebugPrivilege 1132 RQF #00811-AL WASL .exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
RQF #00811-AL WASL .exedescription pid process target process PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe PID 2924 wrote to memory of 1132 2924 RQF #00811-AL WASL .exe RQF #00811-AL WASL .exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RQF #00811-AL WASL .exe"C:\Users\Admin\AppData\Local\Temp\RQF #00811-AL WASL .exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RQF #00811-AL WASL .exe"C:\Users\Admin\AppData\Local\Temp\RQF #00811-AL WASL .exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RQF #00811-AL WASL .exe.logFilesize
617B
MD599e770c0d4043aa84ef3d3cbc7723c25
SHA119829c5c413fccba750a3357f938dfa94486acad
SHA25633c7dd4c852dae6462c701337f8e0a8647602847ccaee656fa6f1149cccfb5d5
SHA512ba521e2f57d7e1db19445201948caa7af6d953e1c1340228934888f8ec05b8984ad492122d0bf0550b5e679614d8a713ecf68f91916ffa6e5d8f75bf003aae39
-
memory/1132-138-0x0000000005740000-0x000000000584A000-memory.dmpFilesize
1.0MB
-
memory/1132-139-0x0000000006A30000-0x0000000006BF2000-memory.dmpFilesize
1.8MB
-
memory/1132-133-0x0000000000000000-mapping.dmp
-
memory/1132-134-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1132-135-0x0000000005BC0000-0x00000000061D8000-memory.dmpFilesize
6.1MB
-
memory/1132-136-0x0000000002F40000-0x0000000002F52000-memory.dmpFilesize
72KB
-
memory/1132-144-0x0000000007110000-0x000000000712E000-memory.dmpFilesize
120KB
-
memory/1132-143-0x0000000007050000-0x00000000070C6000-memory.dmpFilesize
472KB
-
memory/1132-137-0x0000000005490000-0x00000000054CC000-memory.dmpFilesize
240KB
-
memory/1132-140-0x0000000007130000-0x000000000765C000-memory.dmpFilesize
5.2MB
-
memory/1132-141-0x00000000069B0000-0x0000000006A16000-memory.dmpFilesize
408KB
-
memory/1132-142-0x0000000006E30000-0x0000000006EC2000-memory.dmpFilesize
584KB
-
memory/2924-130-0x0000000000540000-0x00000000005FA000-memory.dmpFilesize
744KB
-
memory/2924-132-0x0000000005950000-0x0000000005EF4000-memory.dmpFilesize
5.6MB
-
memory/2924-131-0x0000000004F10000-0x0000000004FAC000-memory.dmpFilesize
624KB