Analysis

  • max time kernel
    61s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2022, 07:09

General

  • Target

    2244-170-0x0000000007210000-0x0000000007258000-memory.exe

  • Size

    288KB

  • MD5

    2e68e342e9ea6801a7391e166eabd97d

  • SHA1

    3377a23a83a80118b5fefdad14b3fafcce422319

  • SHA256

    fe15a196c98943d3c5d8b885bd03465604537a9f458a51b99a982be06a3bcce0

  • SHA512

    2cebeefd9fb0872036d6b588786dcd46c45ed5309aa790552b0e3c1ae19a1d8cd92dd7fd767d5c6da4009febc2a248b2f4513df37913d6bc442464cdd4cf9cd9

  • SSDEEP

    3072:C8WKY8UhroneC0rxNJf3a9ywFU/I1pQsjKpfOB84egmDkrzpiu6:Ckne/nJf7wFgIpr85gmDOz

Malware Config

Extracted

Family

redline

Botnet

dozkey

C2

193.106.191.24:47242

Attributes
  • auth_value

    6386fb6f33ca338f864abfc5f8fe1774

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2244-170-0x0000000007210000-0x0000000007258000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2244-170-0x0000000007210000-0x0000000007258000-memory.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4996-132-0x0000000000020000-0x0000000000068000-memory.dmp

    Filesize

    288KB