Analysis
-
max time kernel
94s -
max time network
109s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
16-05-2022 17:40
Static task
static1
General
-
Target
390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf.exe
-
Size
431KB
-
MD5
e7b96d88cac80398700ee2a5da41d67b
-
SHA1
ef85db9a2ef353d97bb074d330b44d72d016ae47
-
SHA256
390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf
-
SHA512
eec95f529c23f7a99810449d382fbd24efbcb0229b70b3ccaadd8214b1d1ba419d5176140bebf2781d5ee997487dd41d5c340866e76541a747aed53e3a4ddca9
Malware Config
Extracted
redline
test1
185.215.113.75:80
-
auth_value
7ab4a4e2eae9eb7ae10f64f68df53bb3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf.exepid process 3224 390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf.exedescription pid process Token: SeDebugPrivilege 3224 390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf.exe"C:\Users\Admin\AppData\Local\Temp\390eeeda15e3d39c80e353464d36beb1c7d017cd308129493e490108d1c093cf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3224-118-0x0000000002C60000-0x0000000002DAA000-memory.dmpFilesize
1.3MB
-
memory/3224-119-0x0000000002B90000-0x0000000002C3E000-memory.dmpFilesize
696KB
-
memory/3224-120-0x0000000004920000-0x0000000004950000-memory.dmpFilesize
192KB
-
memory/3224-121-0x0000000000400000-0x0000000002B89000-memory.dmpFilesize
39.5MB
-
memory/3224-122-0x00000000076E0000-0x0000000007BDE000-memory.dmpFilesize
5.0MB
-
memory/3224-123-0x0000000004AA0000-0x0000000004ACE000-memory.dmpFilesize
184KB
-
memory/3224-124-0x0000000007BE0000-0x00000000081E6000-memory.dmpFilesize
6.0MB
-
memory/3224-125-0x0000000004D80000-0x0000000004D92000-memory.dmpFilesize
72KB
-
memory/3224-126-0x0000000007510000-0x000000000761A000-memory.dmpFilesize
1.0MB
-
memory/3224-127-0x0000000004ED0000-0x0000000004F0E000-memory.dmpFilesize
248KB
-
memory/3224-128-0x0000000004F50000-0x0000000004F9B000-memory.dmpFilesize
300KB
-
memory/3224-129-0x0000000008D60000-0x0000000008DD6000-memory.dmpFilesize
472KB
-
memory/3224-130-0x0000000008DE0000-0x0000000008E72000-memory.dmpFilesize
584KB
-
memory/3224-131-0x0000000008FE0000-0x0000000008FFE000-memory.dmpFilesize
120KB
-
memory/3224-132-0x00000000090A0000-0x0000000009106000-memory.dmpFilesize
408KB
-
memory/3224-133-0x00000000094F0000-0x00000000096B2000-memory.dmpFilesize
1.8MB
-
memory/3224-134-0x00000000096C0000-0x0000000009BEC000-memory.dmpFilesize
5.2MB