Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
24-05-2022 04:50
Static task
static1
Behavioral task
behavioral1
Sample
21831558535de347468834198ecd50c02be0e057da440d3e0facb95093f05eb4.exe
Resource
win10-20220414-en
windows10_x64
0 signatures
0 seconds
General
-
Target
21831558535de347468834198ecd50c02be0e057da440d3e0facb95093f05eb4.exe
-
Size
405KB
-
MD5
a0edd5bcc0677ccabfa1ae4b46a66fd8
-
SHA1
142581abf1dfef51083819d239fef84babee2166
-
SHA256
21831558535de347468834198ecd50c02be0e057da440d3e0facb95093f05eb4
-
SHA512
a901222db81f78019e50e1044a4c9b1e0543b8064d06e09742605c47ccd9c2743170e397da2c6dbf5b7366c18477dd0d72bb28850f47b57840f7ba60489aab72
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
test1
C2
185.215.113.75:80
Attributes
-
auth_value
7ab4a4e2eae9eb7ae10f64f68df53bb3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
21831558535de347468834198ecd50c02be0e057da440d3e0facb95093f05eb4.exedescription pid process Token: SeDebugPrivilege 2192 21831558535de347468834198ecd50c02be0e057da440d3e0facb95093f05eb4.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2192-119-0x0000000002860000-0x0000000002890000-memory.dmpFilesize
192KB
-
memory/2192-120-0x0000000000BD7000-0x0000000000C01000-memory.dmpFilesize
168KB
-
memory/2192-122-0x0000000005280000-0x000000000577E000-memory.dmpFilesize
5.0MB
-
memory/2192-121-0x0000000000AE0000-0x0000000000B17000-memory.dmpFilesize
220KB
-
memory/2192-123-0x0000000000400000-0x000000000092E000-memory.dmpFilesize
5.2MB
-
memory/2192-124-0x0000000002B60000-0x0000000002B8E000-memory.dmpFilesize
184KB
-
memory/2192-125-0x0000000005780000-0x0000000005D86000-memory.dmpFilesize
6.0MB
-
memory/2192-126-0x0000000002D40000-0x0000000002D52000-memory.dmpFilesize
72KB
-
memory/2192-127-0x00000000050F0000-0x00000000051FA000-memory.dmpFilesize
1.0MB
-
memory/2192-128-0x0000000005200000-0x000000000523E000-memory.dmpFilesize
248KB
-
memory/2192-129-0x0000000005E90000-0x0000000005EDB000-memory.dmpFilesize
300KB