Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-05-2022 19:08
Static task
static1
Behavioral task
behavioral1
Sample
859e6cf84ff73e9a9921fb829c3a386e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
859e6cf84ff73e9a9921fb829c3a386e.exe
Resource
win10v2004-20220414-en
General
-
Target
859e6cf84ff73e9a9921fb829c3a386e.exe
-
Size
777KB
-
MD5
859e6cf84ff73e9a9921fb829c3a386e
-
SHA1
5bbc936fdb82ed3e57c1ae2f4a0cbfab459883b7
-
SHA256
cad1b58e38cfc1e0a0431fa9aae253a1626b4e4e3a6cbc6a8f119cd4959f6410
-
SHA512
bae39f648487e4ac364152cf18061d28d834f11ea27027075ebc41508d0850fd5416b0fcfdfedbc66afc4c734bb969625046cb8f18523e437f49fb6edecc1a4c
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1756-56-0x00000000012F0000-0x0000000001396000-memory.dmp family_redline behavioral1/memory/1756-57-0x00000000012F0000-0x0000000001396000-memory.dmp family_redline behavioral1/memory/1756-64-0x00000000012F0000-0x0000000001396000-memory.dmp family_redline behavioral1/memory/1756-69-0x00000000012F0000-0x0000000001396000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
859e6cf84ff73e9a9921fb829c3a386e.exepid process 1756 859e6cf84ff73e9a9921fb829c3a386e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
859e6cf84ff73e9a9921fb829c3a386e.exedescription pid process Token: SeDebugPrivilege 1756 859e6cf84ff73e9a9921fb829c3a386e.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1756-54-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/1756-55-0x0000000074DE0000-0x0000000074E2A000-memory.dmpFilesize
296KB
-
memory/1756-56-0x00000000012F0000-0x0000000001396000-memory.dmpFilesize
664KB
-
memory/1756-57-0x00000000012F0000-0x0000000001396000-memory.dmpFilesize
664KB
-
memory/1756-59-0x00000000764F0000-0x000000007659C000-memory.dmpFilesize
688KB
-
memory/1756-60-0x0000000076D40000-0x0000000076D87000-memory.dmpFilesize
284KB
-
memory/1756-61-0x0000000077080000-0x00000000770D7000-memory.dmpFilesize
348KB
-
memory/1756-63-0x0000000074F60000-0x00000000750BC000-memory.dmpFilesize
1.4MB
-
memory/1756-64-0x00000000012F0000-0x0000000001396000-memory.dmpFilesize
664KB
-
memory/1756-65-0x0000000076FF0000-0x000000007707F000-memory.dmpFilesize
572KB
-
memory/1756-66-0x0000000074C20000-0x0000000074CA0000-memory.dmpFilesize
512KB
-
memory/1756-68-0x0000000000140000-0x0000000000183000-memory.dmpFilesize
268KB
-
memory/1756-69-0x00000000012F0000-0x0000000001396000-memory.dmpFilesize
664KB
-
memory/1756-70-0x0000000076D40000-0x0000000076D87000-memory.dmpFilesize
284KB
-
memory/1756-67-0x00000000750C0000-0x0000000075D0A000-memory.dmpFilesize
12.3MB
-
memory/1756-71-0x000000006D1F0000-0x000000006D207000-memory.dmpFilesize
92KB
-
memory/1756-72-0x00000000769B0000-0x00000000769E5000-memory.dmpFilesize
212KB
-
memory/1756-73-0x000000006BCE0000-0x000000006BE70000-memory.dmpFilesize
1.6MB
-
memory/1756-74-0x000000006A920000-0x000000006A937000-memory.dmpFilesize
92KB