Analysis

  • max time kernel
    50s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    19-05-2022 21:35

General

  • Target

    12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6.exe

  • Size

    409KB

  • MD5

    9e0c502a8d0bfa3e0a4dcab3279131b9

  • SHA1

    745aed37113f2d87e8ce34cbec397d9ac6696da5

  • SHA256

    12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6

  • SHA512

    460665306b2a7cb28029cac57694abd6a6b17c19fd4acd4dc54b921ecf78c1c0dbf4c0ddf5efb16ee7cdf7f14d630ddc3c9240a95e8b7cff6cb997734cc05b8c

Malware Config

Extracted

Family

redline

Botnet

test1

C2

185.215.113.75:80

Attributes
  • auth_value

    7ab4a4e2eae9eb7ae10f64f68df53bb3

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6.exe
    "C:\Users\Admin\AppData\Local\Temp\12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3892

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3892-115-0x0000000002270000-0x00000000022A0000-memory.dmp
    Filesize

    192KB

  • memory/3892-116-0x00000000005A0000-0x00000000006EA000-memory.dmp
    Filesize

    1.3MB

  • memory/3892-117-0x00000000007F0000-0x0000000000827000-memory.dmp
    Filesize

    220KB

  • memory/3892-118-0x0000000000400000-0x00000000004A7000-memory.dmp
    Filesize

    668KB

  • memory/3892-119-0x0000000004D30000-0x000000000522E000-memory.dmp
    Filesize

    5.0MB

  • memory/3892-120-0x00000000025D0000-0x00000000025FE000-memory.dmp
    Filesize

    184KB

  • memory/3892-121-0x0000000005230000-0x0000000005836000-memory.dmp
    Filesize

    6.0MB

  • memory/3892-122-0x00000000027C0000-0x00000000027D2000-memory.dmp
    Filesize

    72KB

  • memory/3892-123-0x0000000005840000-0x000000000594A000-memory.dmp
    Filesize

    1.0MB

  • memory/3892-124-0x0000000004C40000-0x0000000004C7E000-memory.dmp
    Filesize

    248KB

  • memory/3892-125-0x0000000004CD0000-0x0000000004D1B000-memory.dmp
    Filesize

    300KB

  • memory/3892-126-0x0000000006660000-0x00000000066C6000-memory.dmp
    Filesize

    408KB

  • memory/3892-127-0x00000000069A0000-0x0000000006A16000-memory.dmp
    Filesize

    472KB

  • memory/3892-128-0x0000000006A50000-0x0000000006AE2000-memory.dmp
    Filesize

    584KB

  • memory/3892-129-0x0000000006C50000-0x0000000006C6E000-memory.dmp
    Filesize

    120KB

  • memory/3892-130-0x0000000006E80000-0x0000000007042000-memory.dmp
    Filesize

    1.8MB

  • memory/3892-131-0x0000000007050000-0x000000000757C000-memory.dmp
    Filesize

    5.2MB