Analysis

  • max time kernel
    139s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    23-05-2022 17:13

General

  • Target

    a65a4d25b448f2b71198642e412ed197991a6451e54604f401a09c0300dce149.exe

  • Size

    378KB

  • MD5

    a66debff880f0a181e9f8d63af4d4935

  • SHA1

    5dbf04d8a1171b0a6c9255dbafac64fc424886ca

  • SHA256

    a65a4d25b448f2b71198642e412ed197991a6451e54604f401a09c0300dce149

  • SHA512

    b9e88374727422e96d2d8c746d4ebd7aa646ce148a00d77d749b6ec9890822cb767bff3bbe3fb0a5428a7b03bd5371d6be959a2db7b14e2b3401ef2e43ceb4d2

Malware Config

Extracted

Family

redline

Botnet

test1

C2

185.215.113.75:80

Attributes
  • auth_value

    7ab4a4e2eae9eb7ae10f64f68df53bb3

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a65a4d25b448f2b71198642e412ed197991a6451e54604f401a09c0300dce149.exe
    "C:\Users\Admin\AppData\Local\Temp\a65a4d25b448f2b71198642e412ed197991a6451e54604f401a09c0300dce149.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2932-118-0x0000000000400000-0x00000000004A3000-memory.dmp
    Filesize

    652KB

  • memory/2932-117-0x0000000000530000-0x00000000005DE000-memory.dmp
    Filesize

    696KB

  • memory/2932-116-0x0000000000530000-0x000000000067A000-memory.dmp
    Filesize

    1.3MB

  • memory/2932-115-0x0000000002520000-0x0000000002550000-memory.dmp
    Filesize

    192KB

  • memory/2932-120-0x00000000026E0000-0x000000000270E000-memory.dmp
    Filesize

    184KB

  • memory/2932-119-0x0000000004C00000-0x00000000050FE000-memory.dmp
    Filesize

    5.0MB

  • memory/2932-122-0x0000000005730000-0x0000000005742000-memory.dmp
    Filesize

    72KB

  • memory/2932-123-0x0000000005760000-0x000000000586A000-memory.dmp
    Filesize

    1.0MB

  • memory/2932-121-0x0000000005100000-0x0000000005706000-memory.dmp
    Filesize

    6.0MB

  • memory/2932-124-0x0000000005870000-0x00000000058AE000-memory.dmp
    Filesize

    248KB

  • memory/2932-125-0x0000000005900000-0x000000000594B000-memory.dmp
    Filesize

    300KB