Analysis
-
max time kernel
49s -
max time network
70s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-05-2022 14:00
Static task
static1
General
-
Target
84d9e912e24a27aa3b4f77f75c3817594f188bd3f0fc3edf9f4669e65b5755b3.exe
-
Size
407KB
-
MD5
4c3394cc1e57b8d6ca1b3a087d05909f
-
SHA1
b15397cb1c3a556babf5e93032c78f346ddcbd5f
-
SHA256
84d9e912e24a27aa3b4f77f75c3817594f188bd3f0fc3edf9f4669e65b5755b3
-
SHA512
62d377c4c7cf9c7e264e0b5a98cae87fba5c7ddc3fb67f9478102883fb3d420dfe04062e6572a2f2e8ab48a0ab4606ccecd24243fa6eab875e16ad493699bf53
Malware Config
Extracted
redline
test1
185.215.113.75:80
-
auth_value
7ab4a4e2eae9eb7ae10f64f68df53bb3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
84d9e912e24a27aa3b4f77f75c3817594f188bd3f0fc3edf9f4669e65b5755b3.exepid process 3588 84d9e912e24a27aa3b4f77f75c3817594f188bd3f0fc3edf9f4669e65b5755b3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
84d9e912e24a27aa3b4f77f75c3817594f188bd3f0fc3edf9f4669e65b5755b3.exedescription pid process Token: SeDebugPrivilege 3588 84d9e912e24a27aa3b4f77f75c3817594f188bd3f0fc3edf9f4669e65b5755b3.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Downloads
-
memory/3588-120-0x00000000021C0000-0x00000000021F0000-memory.dmpFilesize
192KB
-
memory/3588-121-0x0000000000570000-0x00000000006BA000-memory.dmpFilesize
1MB
-
memory/3588-122-0x0000000000570000-0x00000000006BA000-memory.dmpFilesize
1MB
-
memory/3588-123-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/3588-124-0x0000000004D00000-0x00000000051FE000-memory.dmpFilesize
4MB
-
memory/3588-125-0x0000000002540000-0x000000000256E000-memory.dmpFilesize
184KB
-
memory/3588-126-0x0000000005200000-0x0000000005806000-memory.dmpFilesize
6MB
-
memory/3588-127-0x0000000002720000-0x0000000002732000-memory.dmpFilesize
72KB
-
memory/3588-128-0x0000000005810000-0x000000000591A000-memory.dmpFilesize
1MB
-
memory/3588-129-0x0000000004C40000-0x0000000004C7E000-memory.dmpFilesize
248KB
-
memory/3588-130-0x0000000005920000-0x000000000596B000-memory.dmpFilesize
300KB
-
memory/3588-131-0x0000000006660000-0x00000000066C6000-memory.dmpFilesize
408KB
-
memory/3588-132-0x00000000069A0000-0x0000000006A16000-memory.dmpFilesize
472KB
-
memory/3588-133-0x0000000006A80000-0x0000000006B12000-memory.dmpFilesize
584KB
-
memory/3588-134-0x0000000006B60000-0x0000000006B7E000-memory.dmpFilesize
120KB
-
memory/3588-135-0x0000000006D90000-0x0000000006F52000-memory.dmpFilesize
1MB
-
memory/3588-136-0x0000000006F60000-0x000000000748C000-memory.dmpFilesize
5MB