Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2022 02:11

General

  • Target

    a4be4e5fceb959b7295027c3709e2456.exe

  • Size

    277KB

  • MD5

    a4be4e5fceb959b7295027c3709e2456

  • SHA1

    65a8d3c6e2e7c0ea4db92cc03708b78903ef59e2

  • SHA256

    4be839ef16079be8c184fae241e067b607860f60c7cc45f4de438f0ab1ec722e

  • SHA512

    c3e6534b331fc6dc0dd1bba1b19bc4ae6d56512fa406392cbfadb6e44f6a6fa478111316d9cf6a2e313a9cd2b85b84342b68efb14de88db73380c22ae528d78e

  • SSDEEP

    3072:oSKUgg55LPC49fksp1LQ2ej41cuKsBzITvVJVl5azxGTqvoOydDa0aAnd4BdtypL:HlCmvp1LQ9PuLITth5Wx6XaDAnCrP

Malware Config

Extracted

Family

redline

Botnet

Test

C2

46.18.107.225:6134

Attributes
  • auth_value

    670d22280e1d18e7a969eb0dd4e2f47c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4be4e5fceb959b7295027c3709e2456.exe
    "C:\Users\Admin\AppData\Local\Temp\a4be4e5fceb959b7295027c3709e2456.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1764-54-0x00000000002AB000-0x00000000002DC000-memory.dmp

    Filesize

    196KB

  • memory/1764-55-0x0000000001CF0000-0x0000000001D2E000-memory.dmp

    Filesize

    248KB

  • memory/1764-56-0x0000000000400000-0x000000000059F000-memory.dmp

    Filesize

    1.6MB

  • memory/1764-57-0x00000000020A0000-0x00000000020DE000-memory.dmp

    Filesize

    248KB

  • memory/1764-58-0x0000000002140000-0x000000000217C000-memory.dmp

    Filesize

    240KB

  • memory/1764-59-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB