Analysis

  • max time kernel
    34s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2023 01:55

General

  • Target

    RedLine_Free.exe

  • Size

    2.2MB

  • MD5

    745265a885945c2ee9ad960ebc75d0a7

  • SHA1

    df42a4c17f45df777ce2bf8b4bb7651f0cd603ba

  • SHA256

    b044c2299a0e72d2a3fec0529f9a31ea79eb5cc1754f86be440a5e57d673d687

  • SHA512

    56b74156c2e8881ff0b4eb3b58ce172ec2183bea2408ac0efe6f7dbd7181f508794857cee6ac2a772505166d4e0860e69be6bcc20c3af4a1f6168d786550299b

  • SSDEEP

    49152:Mn8CrPXVmwyUlcf3c6x8ET5daZ5LUbuOeY5RmdKZJFq:RCrPkwy0u3Ym5daZdjObRJO

Score
10/10

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Support DLL 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RedLine_Free.exe
    "C:\Users\Admin\AppData\Local\Temp\RedLine_Free.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

    Filesize

    40KB

    MD5

    94173de2e35aa8d621fc1c4f54b2a082

    SHA1

    fbb2266ee47f88462560f0370edb329554cd5869

    SHA256

    7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f

    SHA512

    cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

  • memory/868-132-0x0000000000DA0000-0x0000000000FDA000-memory.dmp

    Filesize

    2.2MB

  • memory/868-134-0x0000000007210000-0x00000000077B4000-memory.dmp

    Filesize

    5.6MB

  • memory/868-135-0x0000000006D00000-0x0000000006D92000-memory.dmp

    Filesize

    584KB

  • memory/868-136-0x0000000006CA0000-0x0000000006CAA000-memory.dmp

    Filesize

    40KB

  • memory/868-137-0x000000000C380000-0x000000000C41C000-memory.dmp

    Filesize

    624KB