General
Target

69f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe

Filesize

413KB

Completed

23-06-2022 15:18

Task

behavioral1

Score
10/10
MD5

e1e03c5fd950b7e5a22a46d222d212ab

SHA1

94ae9d31f2a6585f7cb1e215fdc94a74edc47de4

SHA256

69f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330

SHA256

623747426d5c958256dbd5c20e9236f97cffbb3d6364129a3dbb48c43fcbab0239a110d645c5cbbc165db3bb4ca322c296967eab0898df999e4050110d151d61

Malware Config

Extracted

Family

redline

Botnet

RUZKI

C2

193.106.191.246:23196

Attributes
auth_value
121027c094f768a0a0e9b562f6417952
Signatures 6

Filter: none

Collection
Credential Access
Discovery
  • RedLine

    Description

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Suspicious behavior: EnumeratesProcesses
    69f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe

    Reported IOCs

    pidprocess
    308069f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe
    308069f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe
  • Suspicious use of AdjustPrivilegeToken
    69f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege308069f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe
Processes 1
  • C:\Users\Admin\AppData\Local\Temp\69f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe
    "C:\Users\Admin\AppData\Local\Temp\69f519741f2e0b6ba467573dcaf917944875b746c8e7f5105670ee28487e0330.exe"
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    PID:3080
Network
MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Discovery
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Replay Monitor
                    00:00 00:00
                    Downloads
                    • memory/3080-116-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-117-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-118-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-119-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-120-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-121-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-122-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-123-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-124-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-125-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-126-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-127-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-128-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-129-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-130-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-131-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-132-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-133-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-134-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-135-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-136-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-137-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-138-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-139-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-140-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-141-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-142-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-143-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-144-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-145-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-146-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-147-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-148-0x0000000000DCA000-0x0000000000DF4000-memory.dmp

                    • memory/3080-149-0x0000000000CD0000-0x0000000000D07000-memory.dmp

                    • memory/3080-150-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-152-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-151-0x0000000000400000-0x0000000000B5A000-memory.dmp

                    • memory/3080-153-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-154-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-155-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-156-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-157-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-158-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-159-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-160-0x0000000002BD0000-0x0000000002C00000-memory.dmp

                    • memory/3080-161-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-162-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-163-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-164-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-165-0x0000000005550000-0x0000000005A4E000-memory.dmp

                    • memory/3080-166-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-167-0x0000000002D80000-0x0000000002DAE000-memory.dmp

                    • memory/3080-168-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-169-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-170-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-171-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-172-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-173-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-174-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-175-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-176-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-177-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-178-0x0000000005A50000-0x0000000006056000-memory.dmp

                    • memory/3080-179-0x0000000002F80000-0x0000000002F92000-memory.dmp

                    • memory/3080-180-0x0000000005350000-0x000000000545A000-memory.dmp

                    • memory/3080-181-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-182-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-183-0x0000000005460000-0x000000000549E000-memory.dmp

                    • memory/3080-184-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-185-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-186-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-187-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-188-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-189-0x00000000772B0000-0x000000007743E000-memory.dmp

                    • memory/3080-191-0x00000000054A0000-0x00000000054EB000-memory.dmp

                    • memory/3080-195-0x0000000006260000-0x00000000062D6000-memory.dmp

                    • memory/3080-196-0x0000000006350000-0x00000000063E2000-memory.dmp

                    • memory/3080-199-0x0000000006230000-0x000000000624E000-memory.dmp

                    • memory/3080-201-0x00000000065A0000-0x0000000006606000-memory.dmp

                    • memory/3080-209-0x0000000006D90000-0x0000000006F52000-memory.dmp

                    • memory/3080-210-0x0000000006F70000-0x000000000749C000-memory.dmp

                    • memory/3080-213-0x0000000000DCA000-0x0000000000DF4000-memory.dmp

                    • memory/3080-218-0x0000000000DCA000-0x0000000000DF4000-memory.dmp

                    • memory/3080-219-0x0000000000400000-0x0000000000B5A000-memory.dmp