Analysis

  • max time kernel
    127s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 19:43

General

  • Target

    9617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c.exe

  • Size

    317KB

  • MD5

    d46c47543ab771c8d6bd2d7c9ba853a3

  • SHA1

    b339decb0fd779a0a7c192d321aec1017808e28e

  • SHA256

    9617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c

  • SHA512

    e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f

  • SSDEEP

    6144:3D8VwwJLvjFAFoqe6jv3gB5HFV7n6kSw8rZuge6Bhk4GuRfk:3D8V7XFAFa6jvQBlnxFnl6Tllk

Malware Config

Extracted

Family

redline

Botnet

Testing.v1

C2

185.106.92.111:2510

Attributes
  • auth_value

    336be733d6f6d74b812efad48d422273

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c.exe
    "C:\Users\Admin\AppData\Local\Temp\9617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1184

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1184-54-0x000000000084B000-0x000000000087C000-memory.dmp

          Filesize

          196KB

        • memory/1184-55-0x0000000000220000-0x000000000025E000-memory.dmp

          Filesize

          248KB

        • memory/1184-56-0x0000000000400000-0x000000000066D000-memory.dmp

          Filesize

          2.4MB

        • memory/1184-57-0x00000000007F0000-0x000000000082E000-memory.dmp

          Filesize

          248KB

        • memory/1184-58-0x000000000084B000-0x000000000087C000-memory.dmp

          Filesize

          196KB

        • memory/1184-59-0x0000000002150000-0x000000000218C000-memory.dmp

          Filesize

          240KB

        • memory/1184-60-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

          Filesize

          8KB