Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-02-2023 08:22
Static task
static1
Behavioral task
behavioral1
Sample
9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d.exe
Resource
win10v2004-20221111-en
General
-
Target
9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d.exe
-
Size
425KB
-
MD5
2640c694829c4a7d31175c3a5b9e8c68
-
SHA1
42604e53f93f32a5fefacf3c0d39c9c5a3f2d66c
-
SHA256
9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d
-
SHA512
79f3c1b93e9b382380e7cde745aa55319f2fadcfa5657cb33afc988235c78a2b20b1e662ef234d0ef28766519c19e88d61bb4fa8199386dd41d00abdd84b332e
-
SSDEEP
12288:UUoavRFka1e7H1vwNJrodCVzWb9CJb7d5ZZ:15KPWnQMzWb9qb7d5n
Malware Config
Extracted
redline
milaf
193.233.20.5:4136
-
auth_value
68aaee25afe3d0ae7d4db09dea02347c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1700-54-0x0000000001E60000-0x0000000001EA6000-memory.dmp family_redline behavioral1/memory/1700-55-0x0000000001EA0000-0x0000000001EE4000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d.exedescription pid process Token: SeDebugPrivilege 1700 9b937c2d0300b162822d6aefaadd4a05aa6005444a6ebb0c34be78019f50da8d.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1700-54-0x0000000001E60000-0x0000000001EA6000-memory.dmpFilesize
280KB
-
memory/1700-55-0x0000000001EA0000-0x0000000001EE4000-memory.dmpFilesize
272KB
-
memory/1700-56-0x0000000075FF1000-0x0000000075FF3000-memory.dmpFilesize
8KB
-
memory/1700-57-0x000000000057C000-0x00000000005AA000-memory.dmpFilesize
184KB
-
memory/1700-58-0x0000000000300000-0x000000000034B000-memory.dmpFilesize
300KB
-
memory/1700-59-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB