Analysis
-
max time kernel
54s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2023 05:42
Static task
static1
General
-
Target
1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exe
-
Size
358KB
-
MD5
ca462ca9d681b4a06601bab788fac509
-
SHA1
2f1cded3df46e5f6df250574f47991a35ee0e24f
-
SHA256
1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a
-
SHA512
58d9f69ebf79b9fbf4ac071b40ad9763b3779a370b8610d7acb3c9c0af32818082fc26841d7f6113dada8fc4c468efa83757e4df8c55f6001595d16450a2282c
-
SSDEEP
6144:JgBqLLXbOZmkVuajuvlYEGsBzlF3CcGvMjapRzWKAF1x8esXist:uBqLXOZmguajutXzCcGb61x8Nt
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4300-122-0x0000000002950000-0x00000000029AA000-memory.dmp family_redline behavioral1/memory/4300-124-0x0000000002A50000-0x0000000002AA8000-memory.dmp family_redline behavioral1/memory/4300-128-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-129-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-131-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-133-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-135-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-137-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-139-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-141-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-143-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-145-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-147-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-149-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-151-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-153-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-155-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-157-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-159-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-161-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-163-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-165-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-167-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-169-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-171-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-173-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-175-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-177-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-179-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-181-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-183-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-185-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-187-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-189-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline behavioral1/memory/4300-191-0x0000000002A50000-0x0000000002AA2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exepid process 4300 1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exe 4300 1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exedescription pid process Token: SeDebugPrivilege 4300 1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exe"C:\Users\Admin\AppData\Local\Temp\1caf85ab5eae6d9fe3c85bb9fa8eaecdec04455d147c0c269a1dfe404357890a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4300-121-0x0000000000AC0000-0x0000000000B22000-memory.dmpFilesize
392KB
-
memory/4300-122-0x0000000002950000-0x00000000029AA000-memory.dmpFilesize
360KB
-
memory/4300-123-0x0000000005220000-0x000000000571E000-memory.dmpFilesize
5.0MB
-
memory/4300-124-0x0000000002A50000-0x0000000002AA8000-memory.dmpFilesize
352KB
-
memory/4300-126-0x0000000005210000-0x0000000005220000-memory.dmpFilesize
64KB
-
memory/4300-125-0x0000000005210000-0x0000000005220000-memory.dmpFilesize
64KB
-
memory/4300-127-0x0000000005210000-0x0000000005220000-memory.dmpFilesize
64KB
-
memory/4300-128-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-129-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-131-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-133-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-135-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-137-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-139-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-141-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-143-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-145-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-147-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-149-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-151-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-153-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-155-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-157-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-159-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-161-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-163-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-165-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-167-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-169-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-171-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-173-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-175-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-177-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-179-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-181-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-183-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-185-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-187-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-189-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-191-0x0000000002A50000-0x0000000002AA2000-memory.dmpFilesize
328KB
-
memory/4300-918-0x0000000005720000-0x0000000005D26000-memory.dmpFilesize
6.0MB
-
memory/4300-919-0x0000000002AF0000-0x0000000002B02000-memory.dmpFilesize
72KB
-
memory/4300-920-0x0000000005090000-0x000000000519A000-memory.dmpFilesize
1.0MB
-
memory/4300-921-0x00000000051A0000-0x00000000051DE000-memory.dmpFilesize
248KB
-
memory/4300-922-0x0000000005D30000-0x0000000005D7B000-memory.dmpFilesize
300KB
-
memory/4300-923-0x0000000005210000-0x0000000005220000-memory.dmpFilesize
64KB
-
memory/4300-924-0x0000000005FC0000-0x0000000006026000-memory.dmpFilesize
408KB
-
memory/4300-925-0x0000000006650000-0x00000000066E2000-memory.dmpFilesize
584KB
-
memory/4300-926-0x0000000006710000-0x0000000006786000-memory.dmpFilesize
472KB
-
memory/4300-927-0x00000000067C0000-0x00000000067DE000-memory.dmpFilesize
120KB
-
memory/4300-928-0x0000000006AE0000-0x0000000006CA2000-memory.dmpFilesize
1.8MB
-
memory/4300-929-0x0000000006CB0000-0x00000000071DC000-memory.dmpFilesize
5.2MB