Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-08-2022 08:35
Static task
static1
Behavioral task
behavioral1
Sample
1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c.exe
Resource
win10v2004-20220812-en
General
-
Target
1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c.exe
-
Size
352KB
-
MD5
312096992dabaa78f39001149136f69f
-
SHA1
f95fccb283b6da9e0dc22f39e9a72b540e1f1445
-
SHA256
1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c
-
SHA512
6b531587ff25f8de76d48ee11da348dddb65411d9fd3b2958760202e812e4f9a8eed767cf55284fd50f123985e5d4a86b179258211fe74b02a8b338682185b9c
Malware Config
Extracted
redline
ruzki
193.106.191.165:39482
-
auth_value
71a0558c0eea274a5bd617ea85786884
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c.exedescription pid process Token: SeDebugPrivilege 1516 1870b9995da0d798507e5661f6dfc6ce375b97e487a2d4c0b89741a2a986ab2c.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1516-54-0x000000000260C000-0x0000000002636000-memory.dmpFilesize
168KB
-
memory/1516-55-0x0000000000220000-0x0000000000258000-memory.dmpFilesize
224KB
-
memory/1516-56-0x0000000003E10000-0x0000000003E42000-memory.dmpFilesize
200KB
-
memory/1516-57-0x0000000000400000-0x00000000024DD000-memory.dmpFilesize
32.9MB
-
memory/1516-58-0x0000000003E90000-0x0000000003EC0000-memory.dmpFilesize
192KB
-
memory/1516-59-0x0000000075841000-0x0000000075843000-memory.dmpFilesize
8KB
-
memory/1516-60-0x000000000260C000-0x0000000002636000-memory.dmpFilesize
168KB