Analysis
-
max time kernel
90s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 11:45
Behavioral task
behavioral1
Sample
b323d8d6dc81377e0cbf869a6dfdea9b.exe
Resource
win7-20220414-en
General
-
Target
b323d8d6dc81377e0cbf869a6dfdea9b.exe
-
Size
91KB
-
MD5
b323d8d6dc81377e0cbf869a6dfdea9b
-
SHA1
2c6d338551dc326a94f906275a209667779c9202
-
SHA256
a6da5c90d33a9a4eb16cd7d56af7b300d4acf17ae935d84f7287ceb17fdfb4a2
-
SHA512
98db9389e2e96702c44f503a60d19f28a5bacab83f985e8c46eab47a5c93c7f4017f5c8c4019d9307213acd2cc720d5589c1fb16f11ecc90bf2bd64de45ae0e6
Malware Config
Extracted
redline
2
vedolevyle.xyz:80
-
auth_value
9466b2ff70a6bdedf5ecba929746e91c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b323d8d6dc81377e0cbf869a6dfdea9b.exepid process 4540 b323d8d6dc81377e0cbf869a6dfdea9b.exe 4540 b323d8d6dc81377e0cbf869a6dfdea9b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b323d8d6dc81377e0cbf869a6dfdea9b.exedescription pid process Token: SeDebugPrivilege 4540 b323d8d6dc81377e0cbf869a6dfdea9b.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4540-133-0x00000000001E0000-0x00000000001FE000-memory.dmpFilesize
120KB
-
memory/4540-134-0x00000000050E0000-0x00000000056F8000-memory.dmpFilesize
6.1MB
-
memory/4540-135-0x0000000004B60000-0x0000000004B72000-memory.dmpFilesize
72KB
-
memory/4540-136-0x0000000004C90000-0x0000000004D9A000-memory.dmpFilesize
1.0MB
-
memory/4540-137-0x0000000004BC0000-0x0000000004BFC000-memory.dmpFilesize
240KB
-
memory/4540-138-0x0000000006170000-0x00000000061D6000-memory.dmpFilesize
408KB
-
memory/4540-139-0x0000000006360000-0x00000000063D6000-memory.dmpFilesize
472KB
-
memory/4540-140-0x0000000006480000-0x0000000006512000-memory.dmpFilesize
584KB
-
memory/4540-141-0x0000000006AD0000-0x0000000007074000-memory.dmpFilesize
5.6MB
-
memory/4540-142-0x0000000006580000-0x000000000659E000-memory.dmpFilesize
120KB
-
memory/4540-143-0x0000000007250000-0x0000000007412000-memory.dmpFilesize
1.8MB
-
memory/4540-144-0x0000000007950000-0x0000000007E7C000-memory.dmpFilesize
5.2MB
-
memory/4540-145-0x00000000071D0000-0x0000000007220000-memory.dmpFilesize
320KB