Analysis

  • max time kernel
    30s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2023 22:21

General

  • Target

    c87befb155b77369e637bff57c434eef30a09844c49e8782c0d8c95a5952e80c.exe

  • Size

    410KB

  • MD5

    c549c17f9362fb952017788d6f2d7d02

  • SHA1

    847cc3a99988b5121750d2cddd8903dcca557175

  • SHA256

    c87befb155b77369e637bff57c434eef30a09844c49e8782c0d8c95a5952e80c

  • SHA512

    abefb610807dec86733c9b07e7d459c7ab0ae914102d52ee5dcd38c4023c21a3190146ce25c1bd8132f230d61c7f0e87cd4e4ff684d0835e07ee731a24a09118

  • SSDEEP

    6144:9rLFeUluUBiSkJ5gs9QX7hIhL4Mw5fz0UskTxOyC1DeQEeRtlpjERj0RFb1:lxeOxSJO97eOMwRzpTTYH1yteFpjEE

Malware Config

Extracted

Family

redline

Botnet

Hack

C2

154.17.165.178:10377

Attributes
  • auth_value

    50233687e98ee274b44a32fcc741f9a4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c87befb155b77369e637bff57c434eef30a09844c49e8782c0d8c95a5952e80c.exe
    "C:\Users\Admin\AppData\Local\Temp\c87befb155b77369e637bff57c434eef30a09844c49e8782c0d8c95a5952e80c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2024

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2024-55-0x0000000001F40000-0x0000000001FB6000-memory.dmp
    Filesize

    472KB

  • memory/2024-56-0x00000000023F0000-0x0000000002464000-memory.dmp
    Filesize

    464KB

  • memory/2024-57-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-58-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-60-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-62-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-64-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-66-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-68-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-70-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-72-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-74-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-76-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-78-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-83-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-85-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-87-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-89-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-91-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-93-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-82-0x0000000004A40000-0x0000000004A80000-memory.dmp
    Filesize

    256KB

  • memory/2024-95-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-97-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-99-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-101-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-103-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-105-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-107-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-109-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-111-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-113-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-81-0x0000000004A40000-0x0000000004A80000-memory.dmp
    Filesize

    256KB

  • memory/2024-115-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-117-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-119-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-121-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-123-0x00000000023F0000-0x000000000245E000-memory.dmp
    Filesize

    440KB

  • memory/2024-79-0x00000000002C0000-0x0000000000323000-memory.dmp
    Filesize

    396KB

  • memory/2024-2012-0x0000000002270000-0x0000000002276000-memory.dmp
    Filesize

    24KB

  • memory/2024-2013-0x0000000004A40000-0x0000000004A80000-memory.dmp
    Filesize

    256KB

  • memory/2024-2015-0x0000000004A40000-0x0000000004A80000-memory.dmp
    Filesize

    256KB

  • memory/2024-2017-0x0000000004A40000-0x0000000004A80000-memory.dmp
    Filesize

    256KB