Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 04:18
Static task
static1
Behavioral task
behavioral1
Sample
571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f.exe
Resource
win10v2004-20220812-en
General
-
Target
571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f.exe
-
Size
403KB
-
MD5
40069c663019903cfbc53e6f86c81380
-
SHA1
c00eefa6059c880ecc63bebf85b002a6f7c74ac2
-
SHA256
571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f
-
SHA512
894f7e8d78d070a169f4116743d9b89a4a60c9f478008f47b26e85e70c7c4b15b7342840671833012ffbb7afcba75251818882cdd43c0796995baf9fd1ebbf9b
-
SSDEEP
12288:2l2GoDuP+zcMMXfbEHcuybEv11BcTDcuwVS:2l2GmuP+zcMMzcrO4uwU
Malware Config
Extracted
redline
NewDef2023
185.106.92.214:2510
-
auth_value
048f34b18865578890538db10b2e9edf
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1584-57-0x0000000002240000-0x000000000227E000-memory.dmp family_redline behavioral1/memory/1584-58-0x00000000047A0000-0x00000000047DC000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f.exedescription pid process Token: SeDebugPrivilege 1584 571f691981d027a91e21c28b7eed60e6fbfafffc7d4bddc6a16421430a9ee13f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1584-54-0x000000000067B000-0x00000000006AC000-memory.dmpFilesize
196KB
-
memory/1584-55-0x0000000000220000-0x000000000025E000-memory.dmpFilesize
248KB
-
memory/1584-56-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/1584-57-0x0000000002240000-0x000000000227E000-memory.dmpFilesize
248KB
-
memory/1584-58-0x00000000047A0000-0x00000000047DC000-memory.dmpFilesize
240KB
-
memory/1584-59-0x000000000067B000-0x00000000006AC000-memory.dmpFilesize
196KB
-
memory/1584-60-0x0000000074BB1000-0x0000000074BB3000-memory.dmpFilesize
8KB