Analysis

  • max time kernel
    4294208s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    12-04-2022 12:19

General

  • Target

    2c99b322294e3bdb7d4847e7a3d3aa4f.exe

  • Size

    417KB

  • MD5

    2c99b322294e3bdb7d4847e7a3d3aa4f

  • SHA1

    935b4415c1428599ebaaa3147263d40da59c3f8c

  • SHA256

    f43218dafaae05d7aae7be5decbfba881ed422e4e14273181cd8bd13f0ed4ab3

  • SHA512

    5c2396dc1caaa36f9d3ed9a762139178a55bc9192c57304e67232ebb4785d3110a592c08c38d0c2f7363a87868725cb74ee8565cdda8528a7f9c0e45fe727b74

Malware Config

Extracted

Family

redline

Botnet

Pablicher

C2

45.156.25.40:33087

Attributes
  • auth_value

    d98cb5afc65a5d402a2e09ebd09bb93d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c99b322294e3bdb7d4847e7a3d3aa4f.exe
    "C:\Users\Admin\AppData\Local\Temp\2c99b322294e3bdb7d4847e7a3d3aa4f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/952-54-0x0000000001FA0000-0x0000000001FD4000-memory.dmp
    Filesize

    208KB

  • memory/952-56-0x0000000000220000-0x000000000024B000-memory.dmp
    Filesize

    172KB

  • memory/952-57-0x0000000000250000-0x0000000000289000-memory.dmp
    Filesize

    228KB

  • memory/952-55-0x0000000002140000-0x0000000002172000-memory.dmp
    Filesize

    200KB

  • memory/952-58-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/952-59-0x0000000004854000-0x0000000004856000-memory.dmp
    Filesize

    8KB