Analysis

  • max time kernel
    40s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2022 15:37

General

  • Target

    1048-55-0x0000000002210000-0x000000000224C000-memory.exe

  • Size

    240KB

  • MD5

    040f647800dd7822a67dbf1a24d0aa61

  • SHA1

    232d77eb12a7a5ab8150cb1448d96e578a47389d

  • SHA256

    3b6b64daf8639dd1deaefeba76e2f1ac88507f8c239ac361ba743125e9994cd5

  • SHA512

    7c5460fa2e87d5747cf9120819dd6b230c34ab0c1db6a86ae4d2d901294bc5619f52e178a3b1f0f7e007fa13527800e56bac63d69b11e3d6656b9c3c4f4bbdb8

  • SSDEEP

    3072:hjqrLWeRQzE+R/17rFjVq5us+nIpOOgAsmZw/YKFHiqoeboe/SR1bthqTOSPwOHX:hjqrIEspVa5bpOvmIufthIPwO

Malware Config

Extracted

Family

redline

Botnet

mytestself

C2

38.22.104.75:9977

Attributes
  • auth_value

    b22078b69f45f5d9d12597cfcefc3b95

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1048-55-0x0000000002210000-0x000000000224C000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1048-55-0x0000000002210000-0x000000000224C000-memory.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1388-54-0x0000000000120000-0x000000000015C000-memory.dmp

    Filesize

    240KB