Analysis

  • max time kernel
    44s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-05-2022 13:37

General

  • Target

    bba7db09449a22cfe8f3310bf1238210.exe

  • Size

    371KB

  • MD5

    bba7db09449a22cfe8f3310bf1238210

  • SHA1

    49ce80fb77d7a06c4de52ddf2457e1dfceb7661c

  • SHA256

    ffd0e59168d8d32c26f16e557b26d7fc45a748ae3d2621f40c740848762249a6

  • SHA512

    930a6dae0d84521584022956aa8f6fffc2f1bd17d4b009647fd23dfc600da9936360ac56f3b5c393a9a61e1f6f1c9846d29b3786f6713383c7cf060653fc5168

Malware Config

Extracted

Family

redline

Botnet

swttestmet

C2

185.215.113.75:4531

Attributes
  • auth_value

    adc5dc30debab8d39a706f26a199fa7e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bba7db09449a22cfe8f3310bf1238210.exe
    "C:\Users\Admin\AppData\Local\Temp\bba7db09449a22cfe8f3310bf1238210.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/780-54-0x0000000002200000-0x0000000002230000-memory.dmp

    Filesize

    192KB

  • memory/780-55-0x0000000002380000-0x00000000023AE000-memory.dmp

    Filesize

    184KB

  • memory/780-57-0x0000000000220000-0x0000000000257000-memory.dmp

    Filesize

    220KB

  • memory/780-56-0x000000000068E000-0x00000000006B8000-memory.dmp

    Filesize

    168KB

  • memory/780-58-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/780-59-0x0000000074E91000-0x0000000074E93000-memory.dmp

    Filesize

    8KB