Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2023, 01:51

General

  • Target

    b435b230822366b00dde38c8983581c814e295aa45bcc996ae2fc30245facda0.exe

  • Size

    376KB

  • MD5

    b015b9bc949bb6595d639c33dae0af23

  • SHA1

    d8b4f1b2673aa211bd67a12da9eaf6dad7b25fd3

  • SHA256

    b435b230822366b00dde38c8983581c814e295aa45bcc996ae2fc30245facda0

  • SHA512

    c8fa0c90a4db74432758397b7d80b6bc15dd26c24081d12d7bac5b19d90d2edb941758ca032852c908e2c4d6ab41bf059aa355a5841c626f88dba890190628c1

  • SSDEEP

    6144:iRULOmaZhLPnoqM4L+UuJ/q091jmwsJrUmdMaghB/enNSOcn7tZY:iRUymaLPoj6+UsFvjHWtQ

Malware Config

Extracted

Family

redline

Botnet

@2023@New

C2

91.215.85.155:32796

Attributes
  • auth_value

    0be5b9b84cd5b707e91a48e341e3f7d7

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b435b230822366b00dde38c8983581c814e295aa45bcc996ae2fc30245facda0.exe
    "C:\Users\Admin\AppData\Local\Temp\b435b230822366b00dde38c8983581c814e295aa45bcc996ae2fc30245facda0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2020

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2020-54-0x0000000002080000-0x00000000020C6000-memory.dmp

          Filesize

          280KB

        • memory/2020-55-0x00000000020C0000-0x0000000002104000-memory.dmp

          Filesize

          272KB

        • memory/2020-56-0x00000000756B1000-0x00000000756B3000-memory.dmp

          Filesize

          8KB

        • memory/2020-59-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2020-58-0x0000000000610000-0x000000000065B000-memory.dmp

          Filesize

          300KB

        • memory/2020-57-0x00000000008DB000-0x000000000090A000-memory.dmp

          Filesize

          188KB

        • memory/2020-60-0x00000000008DB000-0x000000000090A000-memory.dmp

          Filesize

          188KB

        • memory/2020-61-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB