Analysis

  • max time kernel
    161s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 08:02

General

  • Target

    3984-118-0x0000000002840000-0x0000000002874000-memory.exe

  • Size

    208KB

  • MD5

    87ed5ad7bb2a33d56ab84967fb85fe75

  • SHA1

    335bcf7cdf9fbc7e4080bb131f9279898231efa1

  • SHA256

    7b259fc12e3445e51db45a9e255c670e9b4e93073aca8678db3d2afaa0711d4d

  • SHA512

    04e664f2a8fcc7eb9957994fa05316ed52d08dcd09f04278b700f1d56981cd5622e648ea58025ec1ee41abaa4063dc1ec0a06f304acb9ee564c7feaf8b4bf83e

Malware Config

Extracted

Family

redline

Botnet

redline

C2

193.106.191.225:15304

Attributes
  • auth_value

    7357e43942d666e37ce6cba9e0dcacd9

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3984-118-0x0000000002840000-0x0000000002874000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3984-118-0x0000000002840000-0x0000000002874000-memory.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-130-0x0000000000570000-0x00000000005A4000-memory.dmp
    Filesize

    208KB