Analysis

  • max time kernel
    63s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/09/2022, 21:53

General

  • Target

    992abdb10338408a83c490ab2408f929b7f619a70ce5de8cc8667155af73fee1.exe

  • Size

    360KB

  • MD5

    da41cd53428c9a62ff3fd4bdab969b83

  • SHA1

    1f6e899a25e5ddee119760a9aabae863f38e0f6f

  • SHA256

    992abdb10338408a83c490ab2408f929b7f619a70ce5de8cc8667155af73fee1

  • SHA512

    5ed303ec4f690660e7444c9b33c78b365a100f281616e8c561f6f7c6aaa92b2fb3c30697ae9c5fedd55d6ab879e37dc23ed1283fcbb7d506311a2bea03138000

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\992abdb10338408a83c490ab2408f929b7f619a70ce5de8cc8667155af73fee1.exe
    "C:\Users\Admin\AppData\Local\Temp\992abdb10338408a83c490ab2408f929b7f619a70ce5de8cc8667155af73fee1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/880-132-0x00000000005E0000-0x0000000000640000-memory.dmp

    Filesize

    384KB

  • memory/880-133-0x000000000AC90000-0x000000000B2A8000-memory.dmp

    Filesize

    6.1MB

  • memory/880-134-0x000000000A7F0000-0x000000000A8FA000-memory.dmp

    Filesize

    1.0MB

  • memory/880-135-0x000000000A720000-0x000000000A732000-memory.dmp

    Filesize

    72KB

  • memory/880-136-0x000000000A780000-0x000000000A7BC000-memory.dmp

    Filesize

    240KB

  • memory/880-137-0x000000000AA90000-0x000000000AAF6000-memory.dmp

    Filesize

    408KB

  • memory/880-138-0x000000000BB60000-0x000000000C104000-memory.dmp

    Filesize

    5.6MB

  • memory/880-139-0x000000000B680000-0x000000000B712000-memory.dmp

    Filesize

    584KB

  • memory/880-140-0x000000000B7A0000-0x000000000B816000-memory.dmp

    Filesize

    472KB

  • memory/880-141-0x000000000B820000-0x000000000B870000-memory.dmp

    Filesize

    320KB

  • memory/880-142-0x000000000C110000-0x000000000C2D2000-memory.dmp

    Filesize

    1.8MB

  • memory/880-143-0x000000000C810000-0x000000000CD3C000-memory.dmp

    Filesize

    5.2MB