Analysis
-
max time kernel
54s -
max time network
184s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19-01-2023 03:59
Static task
static1
Behavioral task
behavioral1
Sample
957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe
Resource
win10-20220812-en
General
-
Target
957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe
-
Size
426KB
-
MD5
48262a59ebbc4692c7740c28a4e474fb
-
SHA1
1c77f5b522099936d9711bf23c86558c4b101b92
-
SHA256
957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9
-
SHA512
1f629c886005e94463051c70c27cfee4d14ea65a040a0589b884df0d9d6c3e44ed72beba7ac59dbfb3b257764ab19b43eb8f9c875ec7aa9050d9a95431aca406
-
SSDEEP
6144:oaLffttXwfSE780Fjfp7iunsR5WgJ5OPZElnyHSHY:oarfbho80FjfVC5WgJ5OkTH
Malware Config
Extracted
redline
SlovarikTest2
82.115.223.9:15486
-
auth_value
74f576286d26c99e51edf3860e562ae6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3068-161-0x0000000002550000-0x0000000002596000-memory.dmp family_redline behavioral2/memory/3068-168-0x00000000026F0000-0x0000000002734000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exepid process 3068 957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe 3068 957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exedescription pid process Token: SeDebugPrivilege 3068 957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe"C:\Users\Admin\AppData\Local\Temp\957cc969c8429d739d277b0205a7eda4236da449c6bde944f60aac88b7bc9cc9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3068-116-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-117-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-118-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-119-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-120-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-121-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-122-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-123-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-124-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-125-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-126-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-127-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-129-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-128-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-130-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-132-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-131-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-133-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-134-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-135-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-136-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-137-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-138-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-139-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-140-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-142-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-143-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-144-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-145-0x0000000000470000-0x000000000051E000-memory.dmpFilesize
696KB
-
memory/3068-147-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-146-0x0000000002180000-0x00000000021CB000-memory.dmpFilesize
300KB
-
memory/3068-148-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-149-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-150-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-151-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-153-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-152-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-154-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-155-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/3068-156-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-157-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-159-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-158-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-160-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-162-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-161-0x0000000002550000-0x0000000002596000-memory.dmpFilesize
280KB
-
memory/3068-163-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-164-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-165-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-166-0x0000000004BF0000-0x00000000050EE000-memory.dmpFilesize
5.0MB
-
memory/3068-167-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-168-0x00000000026F0000-0x0000000002734000-memory.dmpFilesize
272KB
-
memory/3068-169-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-170-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-171-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-172-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-173-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-174-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-175-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-176-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-177-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-178-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-179-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-180-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-181-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-182-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-183-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-184-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-185-0x0000000005700000-0x0000000005D06000-memory.dmpFilesize
6.0MB
-
memory/3068-186-0x0000000005140000-0x000000000524A000-memory.dmpFilesize
1.0MB
-
memory/3068-187-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-188-0x0000000005280000-0x0000000005292000-memory.dmpFilesize
72KB
-
memory/3068-189-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3068-190-0x00000000052A0000-0x00000000052DE000-memory.dmpFilesize
248KB
-
memory/3068-192-0x00000000053F0000-0x000000000543B000-memory.dmpFilesize
300KB
-
memory/3068-196-0x0000000000470000-0x000000000051E000-memory.dmpFilesize
696KB
-
memory/3068-197-0x0000000005580000-0x0000000005612000-memory.dmpFilesize
584KB
-
memory/3068-199-0x0000000005620000-0x0000000005686000-memory.dmpFilesize
408KB
-
memory/3068-207-0x0000000006330000-0x00000000064F2000-memory.dmpFilesize
1.8MB
-
memory/3068-208-0x0000000006500000-0x0000000006A2C000-memory.dmpFilesize
5.2MB
-
memory/3068-215-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/3068-216-0x0000000000470000-0x000000000051E000-memory.dmpFilesize
696KB