Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2022 04:13

General

  • Target

    f7bde3aeb2878ba2aebc4ea1e61873e8e5a2e8c00867050da2ffa66691f80407.exe

  • Size

    361KB

  • MD5

    ae02e31a199602f4b082a3d055dc827d

  • SHA1

    4c8b40baf0e970286923fdb3ba13773a9245212d

  • SHA256

    f7bde3aeb2878ba2aebc4ea1e61873e8e5a2e8c00867050da2ffa66691f80407

  • SHA512

    a4a9650bfbdc60b7efea5c95a380ccf5f2af4e9ee78ad28ed96bdcc6533e6b22a5601292563aa35eaec704f303c1ae11257fcb5b6d92c1e80f17579aedc3d1db

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7bde3aeb2878ba2aebc4ea1e61873e8e5a2e8c00867050da2ffa66691f80407.exe
    "C:\Users\Admin\AppData\Local\Temp\f7bde3aeb2878ba2aebc4ea1e61873e8e5a2e8c00867050da2ffa66691f80407.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1188-132-0x0000000000670000-0x00000000006D0000-memory.dmp

    Filesize

    384KB

  • memory/1188-133-0x000000000AD00000-0x000000000B318000-memory.dmp

    Filesize

    6.1MB

  • memory/1188-134-0x000000000A880000-0x000000000A98A000-memory.dmp

    Filesize

    1.0MB

  • memory/1188-135-0x000000000A7B0000-0x000000000A7C2000-memory.dmp

    Filesize

    72KB

  • memory/1188-136-0x000000000A810000-0x000000000A84C000-memory.dmp

    Filesize

    240KB

  • memory/1188-137-0x000000000AB50000-0x000000000ABE2000-memory.dmp

    Filesize

    584KB

  • memory/1188-138-0x000000000B8D0000-0x000000000BE74000-memory.dmp

    Filesize

    5.6MB

  • memory/1188-139-0x000000000ABF0000-0x000000000AC56000-memory.dmp

    Filesize

    408KB

  • memory/1188-140-0x000000000B810000-0x000000000B886000-memory.dmp

    Filesize

    472KB

  • memory/1188-141-0x000000000B450000-0x000000000B4A0000-memory.dmp

    Filesize

    320KB

  • memory/1188-142-0x000000000C050000-0x000000000C212000-memory.dmp

    Filesize

    1.8MB

  • memory/1188-143-0x000000000C750000-0x000000000CC7C000-memory.dmp

    Filesize

    5.2MB