Analysis
-
max time kernel
156s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 08:25
Behavioral task
behavioral1
Sample
a1fe952004f21dad2b69227159d220a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1fe952004f21dad2b69227159d220a1.exe
Resource
win10v2004-20221111-en
General
-
Target
a1fe952004f21dad2b69227159d220a1.exe
-
Size
95KB
-
MD5
a1fe952004f21dad2b69227159d220a1
-
SHA1
90bb6a2a48a1eadb0dc9bf4a9c3bfd0a4c09b5d2
-
SHA256
a6ffb52825c97bed3a97c6cea3d3598fa1be09c373b15230a115db861f3642b7
-
SHA512
848b78c693ea1e7cb9efc70e72db5c93bb663a2e8b786bdeaf86509f0bd3fe77d1cfed017c316b13b973541b9c559caef82cedc4462425ac7412d825ef44c6a0
-
SSDEEP
1536:5qs8OqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2Bv3teulgS6p8l:XHuOYj+zi0ZbYe1g0ujyzdgw8
Malware Config
Extracted
redline
cheat
104.234.118.178:63242
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2296-133-0x0000000000CE0000-0x0000000000CFE000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a1fe952004f21dad2b69227159d220a1.exepid process 2296 a1fe952004f21dad2b69227159d220a1.exe 2296 a1fe952004f21dad2b69227159d220a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a1fe952004f21dad2b69227159d220a1.exedescription pid process Token: SeDebugPrivilege 2296 a1fe952004f21dad2b69227159d220a1.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2296-133-0x0000000000CE0000-0x0000000000CFE000-memory.dmpFilesize
120KB
-
memory/2296-134-0x0000000005D40000-0x0000000006358000-memory.dmpFilesize
6.1MB
-
memory/2296-135-0x0000000005660000-0x0000000005672000-memory.dmpFilesize
72KB
-
memory/2296-136-0x00000000056C0000-0x00000000056FC000-memory.dmpFilesize
240KB
-
memory/2296-137-0x0000000005970000-0x0000000005A7A000-memory.dmpFilesize
1.0MB
-
memory/2296-138-0x0000000006C50000-0x0000000006E12000-memory.dmpFilesize
1.8MB
-
memory/2296-139-0x0000000007350000-0x000000000787C000-memory.dmpFilesize
5.2MB
-
memory/2296-140-0x0000000006BE0000-0x0000000006C46000-memory.dmpFilesize
408KB
-
memory/2296-141-0x00000000070F0000-0x0000000007182000-memory.dmpFilesize
584KB
-
memory/2296-142-0x0000000007190000-0x0000000007206000-memory.dmpFilesize
472KB
-
memory/2296-143-0x0000000007E30000-0x00000000083D4000-memory.dmpFilesize
5.6MB
-
memory/2296-144-0x0000000007320000-0x000000000733E000-memory.dmpFilesize
120KB