Analysis
-
max time kernel
159s -
max time network
180s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
24-05-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
f7be66e2c92664c0434b9f443dda17ded3de9bf63a8755f4c1cbf8d9b145e5f6.exe
Resource
win10-20220414-en
General
-
Target
f7be66e2c92664c0434b9f443dda17ded3de9bf63a8755f4c1cbf8d9b145e5f6.exe
-
Size
379KB
-
MD5
50cfa5c9c5473032df06b4196d59b40f
-
SHA1
ab4d955f1572a5505402f1ea6c9f0620ca374fbe
-
SHA256
f7be66e2c92664c0434b9f443dda17ded3de9bf63a8755f4c1cbf8d9b145e5f6
-
SHA512
e0689d3645dbd6eda459b6e39c93a8f06af4741b6bb0557c5856493fa5dc46f9648dc41cda955f6b015ccddaf929816d16a5a67e4c5f331611e07ef08791c5a3
Malware Config
Extracted
redline
test1
185.215.113.75:80
-
auth_value
7ab4a4e2eae9eb7ae10f64f68df53bb3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f7be66e2c92664c0434b9f443dda17ded3de9bf63a8755f4c1cbf8d9b145e5f6.exedescription pid process Token: SeDebugPrivilege 2584 f7be66e2c92664c0434b9f443dda17ded3de9bf63a8755f4c1cbf8d9b145e5f6.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2584-117-0x00000000006E1000-0x000000000070B000-memory.dmpFilesize
168KB
-
memory/2584-119-0x00000000020B0000-0x00000000020E7000-memory.dmpFilesize
220KB
-
memory/2584-118-0x00000000005B0000-0x00000000006FA000-memory.dmpFilesize
1.3MB
-
memory/2584-120-0x0000000000400000-0x00000000004A4000-memory.dmpFilesize
656KB
-
memory/2584-121-0x00000000023B0000-0x00000000023E0000-memory.dmpFilesize
192KB
-
memory/2584-123-0x0000000004B30000-0x0000000004B5E000-memory.dmpFilesize
184KB
-
memory/2584-122-0x0000000004CD0000-0x00000000051CE000-memory.dmpFilesize
5.0MB
-
memory/2584-126-0x00000000057E0000-0x00000000058EA000-memory.dmpFilesize
1.0MB
-
memory/2584-125-0x0000000004C10000-0x0000000004C22000-memory.dmpFilesize
72KB
-
memory/2584-124-0x00000000051D0000-0x00000000057D6000-memory.dmpFilesize
6.0MB
-
memory/2584-127-0x0000000004C80000-0x0000000004CBE000-memory.dmpFilesize
248KB
-
memory/2584-128-0x0000000005900000-0x000000000594B000-memory.dmpFilesize
300KB