Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 02:42
Static task
static1
Behavioral task
behavioral1
Sample
2a385dabed89e71e12a5ab8b2e3c94cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a385dabed89e71e12a5ab8b2e3c94cc.exe
Resource
win10v2004-20220812-en
General
-
Target
2a385dabed89e71e12a5ab8b2e3c94cc.exe
-
Size
397KB
-
MD5
2a385dabed89e71e12a5ab8b2e3c94cc
-
SHA1
153c3e9e0892b98667280b80131b85cb67ce1826
-
SHA256
104c6e38add483533c2c7b42e9c6cbd02cf8549d554c6f8f354d3a33b3e0b798
-
SHA512
17fe21e78e7e648032e8a77fe4865fb7cac717616a746565e6081f17e997603ff78ce70f4bad793fa3d6ab6034b3e829f175bc78b598bf92ba8ba19132d49f2d
-
SSDEEP
6144:AG3fqGDJkVD+lQr5kGaGrFQhVud3BF5rByyoUJv2TSFaOyzUdLAirbRrIm:AGiGtuSlQr5kGaGGh8pBPoUJJyYJ5rI
Malware Config
Extracted
redline
20220906
65.108.122.145:16640
-
auth_value
7b3331507aa7ce65c90e3c77aa238bd8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1160-54-0x0000000000860000-0x0000000000894000-memory.dmp family_redline behavioral1/memory/1160-58-0x0000000002400000-0x0000000002434000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2a385dabed89e71e12a5ab8b2e3c94cc.exedescription pid process Token: SeDebugPrivilege 1160 2a385dabed89e71e12a5ab8b2e3c94cc.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1160-54-0x0000000000860000-0x0000000000894000-memory.dmpFilesize
208KB
-
memory/1160-55-0x000000000094B000-0x0000000000978000-memory.dmpFilesize
180KB
-
memory/1160-56-0x0000000000220000-0x000000000025A000-memory.dmpFilesize
232KB
-
memory/1160-57-0x0000000000400000-0x0000000000860000-memory.dmpFilesize
4.4MB
-
memory/1160-58-0x0000000002400000-0x0000000002434000-memory.dmpFilesize
208KB
-
memory/1160-59-0x0000000075A91000-0x0000000075A93000-memory.dmpFilesize
8KB
-
memory/1160-60-0x000000000094B000-0x0000000000978000-memory.dmpFilesize
180KB