Analysis
-
max time kernel
108s -
max time network
111s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
26-05-2022 13:00
Static task
static1
General
-
Target
fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exe
-
Size
291KB
-
MD5
0aa145be799e0d23197ac24adee25a93
-
SHA1
d7523f7fdda38a239eede78725e7c8ecd73e9d5b
-
SHA256
fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260
-
SHA512
6f6cc19ddc75eab5a8525aa55e65eb8cca201009da2b05843c418648f56053b77ce3caab87da7219ae3b61b509572ae3f1588df11ddd4bfb5e7dc47540221c47
Malware Config
Extracted
redline
top
185.215.113.75:81
-
auth_value
ff6259bc2baf33b54b454aad484fb0ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exepid process 2192 fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exe 2192 fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exedescription pid process Token: SeDebugPrivilege 2192 fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exe"C:\Users\Admin\AppData\Local\Temp\fe4d26e9b1918bda1954010e0663132d44aef8b7d3192db79cb17427beb11260.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2192-119-0x0000000002350000-0x0000000002380000-memory.dmpFilesize
192KB
-
memory/2192-120-0x0000000004BB0000-0x00000000050AE000-memory.dmpFilesize
5.0MB
-
memory/2192-121-0x00000000026A0000-0x00000000026CE000-memory.dmpFilesize
184KB
-
memory/2192-122-0x000000000060A000-0x0000000000633000-memory.dmpFilesize
164KB
-
memory/2192-124-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/2192-123-0x0000000002190000-0x00000000021C7000-memory.dmpFilesize
220KB
-
memory/2192-125-0x00000000050B0000-0x00000000056B6000-memory.dmpFilesize
6.0MB
-
memory/2192-126-0x00000000056D0000-0x00000000056E2000-memory.dmpFilesize
72KB
-
memory/2192-127-0x0000000005700000-0x000000000580A000-memory.dmpFilesize
1.0MB
-
memory/2192-128-0x0000000005810000-0x000000000584E000-memory.dmpFilesize
248KB
-
memory/2192-129-0x00000000058A0000-0x00000000058EB000-memory.dmpFilesize
300KB
-
memory/2192-130-0x0000000006600000-0x0000000006676000-memory.dmpFilesize
472KB
-
memory/2192-131-0x00000000066B0000-0x0000000006742000-memory.dmpFilesize
584KB
-
memory/2192-132-0x00000000068C0000-0x00000000068DE000-memory.dmpFilesize
120KB
-
memory/2192-133-0x0000000006960000-0x00000000069C6000-memory.dmpFilesize
408KB
-
memory/2192-134-0x0000000006CA0000-0x0000000006E62000-memory.dmpFilesize
1.8MB
-
memory/2192-135-0x0000000006E80000-0x00000000073AC000-memory.dmpFilesize
5.2MB