Analysis

  • max time kernel
    127s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2023, 03:46

General

  • Target

    4e5d32a4091d5be9f2b8bd314cf21b01.exe

  • Size

    87KB

  • MD5

    4e5d32a4091d5be9f2b8bd314cf21b01

  • SHA1

    10f51735d091e5ddb9ca13022110cb09b4e8dd20

  • SHA256

    280225ca50c342ca5433e075fd2b8f7a41cd0158a2145cbc1c40194c7f88536f

  • SHA512

    624f86849b53f09e3eb3e5f0f3b86f54e89285a14f05066614ee6fde7543239cadb07dcdcb0dbcbb8963e1a90172b4e7c513ebaaf223644a6a709bbc2e3da3d2

  • SSDEEP

    1536:Lqs4VqiW1aG6jejoigI7QIy5yBiXYvQrKpEteulgS6pz:JkZHY7QyBY8z

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

80

C2

1.1.1.1:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e5d32a4091d5be9f2b8bd314cf21b01.exe
    "C:\Users\Admin\AppData\Local\Temp\4e5d32a4091d5be9f2b8bd314cf21b01.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1820-54-0x00000000010F0000-0x000000000110C000-memory.dmp

          Filesize

          112KB

        • memory/1820-55-0x0000000004B90000-0x0000000004BD0000-memory.dmp

          Filesize

          256KB

        • memory/1820-56-0x0000000004B90000-0x0000000004BD0000-memory.dmp

          Filesize

          256KB