Analysis

  • max time kernel
    138s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 02:42

General

  • Target

    2a385dabed89e71e12a5ab8b2e3c94cc.exe

  • Size

    397KB

  • MD5

    2a385dabed89e71e12a5ab8b2e3c94cc

  • SHA1

    153c3e9e0892b98667280b80131b85cb67ce1826

  • SHA256

    104c6e38add483533c2c7b42e9c6cbd02cf8549d554c6f8f354d3a33b3e0b798

  • SHA512

    17fe21e78e7e648032e8a77fe4865fb7cac717616a746565e6081f17e997603ff78ce70f4bad793fa3d6ab6034b3e829f175bc78b598bf92ba8ba19132d49f2d

  • SSDEEP

    6144:AG3fqGDJkVD+lQr5kGaGrFQhVud3BF5rByyoUJv2TSFaOyzUdLAirbRrIm:AGiGtuSlQr5kGaGGh8pBPoUJJyYJ5rI

Malware Config

Extracted

Family

redline

Botnet

20220906

C2

65.108.122.145:16640

Attributes
  • auth_value

    7b3331507aa7ce65c90e3c77aa238bd8

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a385dabed89e71e12a5ab8b2e3c94cc.exe
    "C:\Users\Admin\AppData\Local\Temp\2a385dabed89e71e12a5ab8b2e3c94cc.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1160-54-0x0000000000860000-0x0000000000894000-memory.dmp
    Filesize

    208KB

  • memory/1160-55-0x000000000094B000-0x0000000000978000-memory.dmp
    Filesize

    180KB

  • memory/1160-56-0x0000000000220000-0x000000000025A000-memory.dmp
    Filesize

    232KB

  • memory/1160-57-0x0000000000400000-0x0000000000860000-memory.dmp
    Filesize

    4.4MB

  • memory/1160-58-0x0000000002400000-0x0000000002434000-memory.dmp
    Filesize

    208KB

  • memory/1160-59-0x0000000075A91000-0x0000000075A93000-memory.dmp
    Filesize

    8KB

  • memory/1160-60-0x000000000094B000-0x0000000000978000-memory.dmp
    Filesize

    180KB