Analysis

  • max time kernel
    91s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/09/2022, 23:57

General

  • Target

    aa0391cbc9a77ad34d11fd126a4c12e9b8708bb4386373f0edaacf0f2f89648e.exe

  • Size

    361KB

  • MD5

    38ef96f61d80df8f5a906a11d24b01ce

  • SHA1

    563c23694751b5a2157a20f8b60afc1256744b7c

  • SHA256

    aa0391cbc9a77ad34d11fd126a4c12e9b8708bb4386373f0edaacf0f2f89648e

  • SHA512

    78f048e72e4dda3005a4a9dc6c65f6e02d936d32188ec1c8e4dfe9a31748ba9728b0ec90038b02e066d4122ca850f083fbf044fb7f4a935b1aa578d0b6acc182

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa0391cbc9a77ad34d11fd126a4c12e9b8708bb4386373f0edaacf0f2f89648e.exe
    "C:\Users\Admin\AppData\Local\Temp\aa0391cbc9a77ad34d11fd126a4c12e9b8708bb4386373f0edaacf0f2f89648e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4988

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4988-132-0x0000000000F60000-0x0000000000FC0000-memory.dmp

          Filesize

          384KB

        • memory/4988-133-0x0000000006050000-0x0000000006668000-memory.dmp

          Filesize

          6.1MB

        • memory/4988-134-0x0000000005B50000-0x0000000005C5A000-memory.dmp

          Filesize

          1.0MB

        • memory/4988-135-0x0000000005A80000-0x0000000005A92000-memory.dmp

          Filesize

          72KB

        • memory/4988-136-0x0000000005AE0000-0x0000000005B1C000-memory.dmp

          Filesize

          240KB

        • memory/4988-137-0x0000000005DF0000-0x0000000005E56000-memory.dmp

          Filesize

          408KB

        • memory/4988-138-0x0000000007110000-0x00000000076B4000-memory.dmp

          Filesize

          5.6MB

        • memory/4988-139-0x0000000006B60000-0x0000000006BF2000-memory.dmp

          Filesize

          584KB

        • memory/4988-140-0x0000000006F00000-0x00000000070C2000-memory.dmp

          Filesize

          1.8MB

        • memory/4988-141-0x00000000082E0000-0x000000000880C000-memory.dmp

          Filesize

          5.2MB

        • memory/4988-142-0x0000000006E70000-0x0000000006EE6000-memory.dmp

          Filesize

          472KB

        • memory/4988-143-0x00000000076C0000-0x0000000007710000-memory.dmp

          Filesize

          320KB