Analysis

  • max time kernel
    77s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2022, 14:39

General

  • Target

    afcbbd68851cc4e74c9f472b8f2928ae5a487ad91d64dd9c7ae56a9c0c18266b.exe

  • Size

    360KB

  • MD5

    6d7f5022f0379e836197db9717bad588

  • SHA1

    d82236794029cf526b51c12704e2ce7c9af3bb2e

  • SHA256

    afcbbd68851cc4e74c9f472b8f2928ae5a487ad91d64dd9c7ae56a9c0c18266b

  • SHA512

    86fe4c440b6c50c48ef38d5afa45f48b3eab77842d8ebbac701ceb399e7845c3d4b601ab1673806067d97a64be2c80e45e315e92378d6e5bbd3f8ddac70aae48

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afcbbd68851cc4e74c9f472b8f2928ae5a487ad91d64dd9c7ae56a9c0c18266b.exe
    "C:\Users\Admin\AppData\Local\Temp\afcbbd68851cc4e74c9f472b8f2928ae5a487ad91d64dd9c7ae56a9c0c18266b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1156

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1156-132-0x0000000000960000-0x00000000009C0000-memory.dmp

          Filesize

          384KB

        • memory/1156-133-0x000000000AFF0000-0x000000000B608000-memory.dmp

          Filesize

          6.1MB

        • memory/1156-134-0x000000000AB70000-0x000000000AC7A000-memory.dmp

          Filesize

          1.0MB

        • memory/1156-135-0x000000000AAA0000-0x000000000AAB2000-memory.dmp

          Filesize

          72KB

        • memory/1156-136-0x000000000AB00000-0x000000000AB3C000-memory.dmp

          Filesize

          240KB

        • memory/1156-137-0x000000000AE40000-0x000000000AED2000-memory.dmp

          Filesize

          584KB

        • memory/1156-138-0x000000000BBC0000-0x000000000C164000-memory.dmp

          Filesize

          5.6MB

        • memory/1156-139-0x000000000B610000-0x000000000B676000-memory.dmp

          Filesize

          408KB

        • memory/1156-140-0x000000000C340000-0x000000000C502000-memory.dmp

          Filesize

          1.8MB

        • memory/1156-141-0x000000000CA40000-0x000000000CF6C000-memory.dmp

          Filesize

          5.2MB

        • memory/1156-142-0x000000000C270000-0x000000000C2E6000-memory.dmp

          Filesize

          472KB

        • memory/1156-143-0x000000000C2F0000-0x000000000C340000-memory.dmp

          Filesize

          320KB