Analysis
-
max time kernel
56s -
max time network
64s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-05-2022 21:41
Static task
static1
General
-
Target
efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a.exe
-
Size
407KB
-
MD5
ac099b380b07f4daf38978c521e2e317
-
SHA1
8424d9e1611b8ab788e22e2e03ab350765d036bf
-
SHA256
efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a
-
SHA512
2c485802aaf9488bb1a66eaa647918147870e731e4e51bdd3c749d367fdb968f9cb2efb3beb521ed9101614241908e8e7440f5f63674181592588ad4bc80a589
Malware Config
Extracted
redline
test1
185.215.113.75:80
-
auth_value
7ab4a4e2eae9eb7ae10f64f68df53bb3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a.exepid process 3148 efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a.exedescription pid process Token: SeDebugPrivilege 3148 efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a.exe"C:\Users\Admin\AppData\Local\Temp\efdfd6707b7c665e2786b7e81e08d0c9e9c50c66a6630e4557e0ef4a1f1ff99a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3148-114-0x0000000000701000-0x000000000072B000-memory.dmpFilesize
168KB
-
memory/3148-115-0x00000000008F0000-0x0000000000927000-memory.dmpFilesize
220KB
-
memory/3148-116-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/3148-117-0x0000000002550000-0x0000000002580000-memory.dmpFilesize
192KB
-
memory/3148-118-0x0000000004CA0000-0x000000000519E000-memory.dmpFilesize
5.0MB
-
memory/3148-119-0x0000000004B50000-0x0000000004B7E000-memory.dmpFilesize
184KB
-
memory/3148-120-0x00000000051A0000-0x00000000057A6000-memory.dmpFilesize
6.0MB
-
memory/3148-121-0x0000000004C10000-0x0000000004C22000-memory.dmpFilesize
72KB
-
memory/3148-122-0x00000000057B0000-0x00000000058BA000-memory.dmpFilesize
1.0MB
-
memory/3148-123-0x0000000004C40000-0x0000000004C7E000-memory.dmpFilesize
248KB
-
memory/3148-124-0x0000000005900000-0x000000000594B000-memory.dmpFilesize
300KB
-
memory/3148-125-0x0000000006660000-0x00000000066C6000-memory.dmpFilesize
408KB
-
memory/3148-126-0x00000000069B0000-0x0000000006A26000-memory.dmpFilesize
472KB
-
memory/3148-127-0x0000000006A60000-0x0000000006AF2000-memory.dmpFilesize
584KB
-
memory/3148-128-0x0000000006B10000-0x0000000006B2E000-memory.dmpFilesize
120KB
-
memory/3148-129-0x0000000006D90000-0x0000000006F52000-memory.dmpFilesize
1.8MB
-
memory/3148-130-0x0000000006F60000-0x000000000748C000-memory.dmpFilesize
5.2MB