Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 02:42
Static task
static1
Behavioral task
behavioral1
Sample
bfa84d51218a1016d99282e2b3c96c07.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bfa84d51218a1016d99282e2b3c96c07.exe
Resource
win10v2004-20220812-en
General
-
Target
bfa84d51218a1016d99282e2b3c96c07.exe
-
Size
434KB
-
MD5
bfa84d51218a1016d99282e2b3c96c07
-
SHA1
087e813867897888b18dc560674979ded11688db
-
SHA256
ce455f9b297408b07efc8aac401fe4b7b645003789b7e854cbee319ad81f10de
-
SHA512
cc5c85aacd30118de5742012e5928edf8723396d7137b319636703f9610bf3207ee8a74f79197e1b113fbfc48f04086f6f9275d95711079e2e7770521313b15c
-
SSDEEP
12288:xnTFzEcSKWyjoXm+g1JC5HcWB02JML+P6oDzn:FFSBaozgV+6L+yir
Malware Config
Extracted
redline
20220825
80.87.192.249:16640
-
auth_value
27aa40395151b318c78ecf2834d1a5a0
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1976-57-0x0000000002390000-0x00000000023C4000-memory.dmp family_redline behavioral1/memory/1976-58-0x0000000002450000-0x0000000002484000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bfa84d51218a1016d99282e2b3c96c07.exedescription pid process Token: SeDebugPrivilege 1976 bfa84d51218a1016d99282e2b3c96c07.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1976-54-0x00000000002EB000-0x0000000000317000-memory.dmpFilesize
176KB
-
memory/1976-55-0x00000000001B0000-0x00000000001E9000-memory.dmpFilesize
228KB
-
memory/1976-56-0x0000000000400000-0x000000000086A000-memory.dmpFilesize
4.4MB
-
memory/1976-57-0x0000000002390000-0x00000000023C4000-memory.dmpFilesize
208KB
-
memory/1976-58-0x0000000002450000-0x0000000002484000-memory.dmpFilesize
208KB
-
memory/1976-59-0x00000000762B1000-0x00000000762B3000-memory.dmpFilesize
8KB
-
memory/1976-60-0x00000000002EB000-0x0000000000317000-memory.dmpFilesize
176KB
-
memory/1976-61-0x00000000001B0000-0x00000000001E9000-memory.dmpFilesize
228KB