Analysis
-
max time kernel
49s -
max time network
70s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
18-05-2022 19:20
Static task
static1
General
-
Target
a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707.exe
-
Size
394KB
-
MD5
a53a33f018dd518277d0d30877b8d5df
-
SHA1
641235cbc5dff8cc28e060465fe1ecc26222465b
-
SHA256
a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707
-
SHA512
26164f6be50753b9b90082e07715cce9e949fd7e53c639b5b16e9eba4e980c9ba3c6418fd93eeb8c8ea8bf8f1edb43400a34a91eb872c93dfcfce4fbc26a0840
Malware Config
Extracted
redline
test1
185.215.113.75:80
-
auth_value
7ab4a4e2eae9eb7ae10f64f68df53bb3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707.exepid process 3588 a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707.exedescription pid process Token: SeDebugPrivilege 3588 a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707.exe"C:\Users\Admin\AppData\Local\Temp\a29c581429ca43470223b40d327fab0b79d4a46f2c34ce8a88ae0f5666aad707.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3588-119-0x0000000002D2A000-0x0000000002D54000-memory.dmpFilesize
168KB
-
memory/3588-120-0x0000000002C00000-0x0000000002D4A000-memory.dmpFilesize
1.3MB
-
memory/3588-121-0x00000000048B0000-0x00000000048E7000-memory.dmpFilesize
220KB
-
memory/3588-122-0x00000000071E0000-0x0000000007210000-memory.dmpFilesize
192KB
-
memory/3588-123-0x0000000000400000-0x0000000002B7F000-memory.dmpFilesize
39.5MB
-
memory/3588-124-0x0000000007210000-0x000000000770E000-memory.dmpFilesize
5.0MB
-
memory/3588-125-0x0000000007750000-0x000000000777E000-memory.dmpFilesize
184KB
-
memory/3588-126-0x0000000007780000-0x0000000007D86000-memory.dmpFilesize
6.0MB
-
memory/3588-127-0x0000000007E00000-0x0000000007E12000-memory.dmpFilesize
72KB
-
memory/3588-128-0x0000000007E30000-0x0000000007F3A000-memory.dmpFilesize
1.0MB
-
memory/3588-129-0x0000000007F40000-0x0000000007F7E000-memory.dmpFilesize
248KB
-
memory/3588-130-0x0000000007FD0000-0x000000000801B000-memory.dmpFilesize
300KB
-
memory/3588-131-0x0000000008D50000-0x0000000008DB6000-memory.dmpFilesize
408KB
-
memory/3588-132-0x0000000009050000-0x00000000090C6000-memory.dmpFilesize
472KB
-
memory/3588-133-0x0000000009100000-0x0000000009192000-memory.dmpFilesize
584KB
-
memory/3588-134-0x0000000009330000-0x000000000934E000-memory.dmpFilesize
120KB
-
memory/3588-135-0x0000000009450000-0x0000000009612000-memory.dmpFilesize
1.8MB
-
memory/3588-136-0x0000000009620000-0x0000000009B4C000-memory.dmpFilesize
5.2MB