Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2023, 13:16

General

  • Target

    05f2dd3d2dacc8633d402e404d918e79.exe

  • Size

    425KB

  • MD5

    05f2dd3d2dacc8633d402e404d918e79

  • SHA1

    4de9d36037feb708c3229dbeb2f202398fb4f221

  • SHA256

    66e93e6252ac9c8f2a02c121abc6b4749c67b131ba0d21b39ef917e695ac84ce

  • SHA512

    e9a50a7f48d1176725110cf2ae48d2990f0652fbfbcbc02e524de464a853aee7381286500d8ec4064920adee32eb38548c2f838a8c93ea683fa0cb305aa3efcd

  • SSDEEP

    6144:0ELvIq0ciBGJzBIlK8oB8KmIkNqX4FMT3quk6or6:0ErIq8kJzklqEMT3qrD6

Malware Config

Extracted

Family

redline

Botnet

bilod

C2

193.233.20.7:4138

Attributes
  • auth_value

    407a8c8d5a1f9a3348afc8c6b0155512

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05f2dd3d2dacc8633d402e404d918e79.exe
    "C:\Users\Admin\AppData\Local\Temp\05f2dd3d2dacc8633d402e404d918e79.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1944

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1944-54-0x0000000002010000-0x0000000002056000-memory.dmp

          Filesize

          280KB

        • memory/1944-55-0x0000000002050000-0x0000000002094000-memory.dmp

          Filesize

          272KB

        • memory/1944-57-0x0000000000490000-0x00000000004DB000-memory.dmp

          Filesize

          300KB

        • memory/1944-56-0x000000000026C000-0x000000000029A000-memory.dmp

          Filesize

          184KB

        • memory/1944-58-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1944-59-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

          Filesize

          8KB

        • memory/1944-60-0x000000000026C000-0x000000000029A000-memory.dmp

          Filesize

          184KB

        • memory/1944-61-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB