Analysis
-
max time kernel
61s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2022 03:44
General
-
Target
c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exe
-
Size
361KB
-
MD5
53a06a4d21d1db545fb35adcb5c86ab6
-
SHA1
7dc4c9904bacc60b620bc6a41d24c3af1618d326
-
SHA256
c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce
-
SHA512
e3a745f74dbbe226b97fc40569026e041e13c8bebf2f3e9b839938bcad6926140c1fe3a13a6f8514c362d94f7006520f14e6d13584132e3180b048064aeeb7b4
-
SSDEEP
6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv
Malware Config
Extracted
redline
0002
13.72.81.58:13413
-
auth_value
866ce0ed8cfe2be77fb43a4912677698
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/676-132-0x0000000000C00000-0x0000000000C60000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exepid process 676 c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exe 676 c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exedescription pid process Token: SeDebugPrivilege 676 c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exe"C:\Users\Admin\AppData\Local\Temp\c796b563fef9a2fe9429812c80c2be6a1db6dde0a73b2de14ad4d5b2512674ce.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/676-132-0x0000000000C00000-0x0000000000C60000-memory.dmpFilesize
384KB
-
memory/676-133-0x0000000005B60000-0x0000000006178000-memory.dmpFilesize
6.1MB
-
memory/676-134-0x00000000056B0000-0x00000000057BA000-memory.dmpFilesize
1.0MB
-
memory/676-135-0x00000000055E0000-0x00000000055F2000-memory.dmpFilesize
72KB
-
memory/676-136-0x0000000005640000-0x000000000567C000-memory.dmpFilesize
240KB
-
memory/676-137-0x0000000005980000-0x0000000005A12000-memory.dmpFilesize
584KB
-
memory/676-138-0x0000000006C20000-0x00000000071C4000-memory.dmpFilesize
5.6MB
-
memory/676-139-0x00000000061F0000-0x0000000006256000-memory.dmpFilesize
408KB
-
memory/676-140-0x0000000006940000-0x0000000006B02000-memory.dmpFilesize
1.8MB
-
memory/676-141-0x0000000008DF0000-0x000000000931C000-memory.dmpFilesize
5.2MB
-
memory/676-142-0x0000000006890000-0x0000000006906000-memory.dmpFilesize
472KB
-
memory/676-143-0x0000000006B10000-0x0000000006B60000-memory.dmpFilesize
320KB