Analysis
-
max time kernel
57s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-03-2023 02:44
Static task
static1
General
-
Target
6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exe
-
Size
355KB
-
MD5
c841f3ba54ae59f29d9e1726e2ea4224
-
SHA1
151b055e592b2c5ab607d33b3a1b4cf1bfcc5134
-
SHA256
6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259
-
SHA512
ff6d1c7de020ea5079f098c2f98fd930df67e99ce60d5cb19cc45a80bff3293c9b1686f0f1ecb0baf4d97242eb22a72c6b21cd309986039ebad38e01c52482e9
-
SSDEEP
6144:+/D+ApNi6b4+CbrhP6urMU9mPnVqE8rVhRwtIEqUJZWf:+L+ApNiCzCbR6urP9mvILVm0cZWf
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-122-0x0000000004CE0000-0x0000000004D3A000-memory.dmp family_redline behavioral1/memory/1764-128-0x0000000007290000-0x00000000072E8000-memory.dmp family_redline behavioral1/memory/1764-129-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-130-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-132-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-134-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-136-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-138-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-140-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-142-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-144-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-146-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-148-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-152-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-150-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-154-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-156-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-158-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-160-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-162-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-164-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-166-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-168-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-174-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-172-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-170-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-176-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-178-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-180-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-184-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-182-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-186-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-188-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-190-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline behavioral1/memory/1764-192-0x0000000007290000-0x00000000072E2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exepid process 1764 6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exe 1764 6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exedescription pid process Token: SeDebugPrivilege 1764 6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exe"C:\Users\Admin\AppData\Local\Temp\6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1764-122-0x0000000004CE0000-0x0000000004D3A000-memory.dmpFilesize
360KB
-
memory/1764-123-0x0000000002E10000-0x0000000002E72000-memory.dmpFilesize
392KB
-
memory/1764-124-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/1764-125-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/1764-126-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/1764-127-0x00000000073B0000-0x00000000078AE000-memory.dmpFilesize
5.0MB
-
memory/1764-128-0x0000000007290000-0x00000000072E8000-memory.dmpFilesize
352KB
-
memory/1764-129-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-130-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-132-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-134-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-136-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-138-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-140-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-142-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-144-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-146-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-148-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-152-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-150-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-154-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-156-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-158-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-160-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-162-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-164-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-166-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-168-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-174-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-172-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-170-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-176-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-178-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-180-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-184-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-182-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-186-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-188-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-190-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-192-0x0000000007290000-0x00000000072E2000-memory.dmpFilesize
328KB
-
memory/1764-919-0x00000000078B0000-0x0000000007EB6000-memory.dmpFilesize
6.0MB
-
memory/1764-920-0x0000000007380000-0x0000000007392000-memory.dmpFilesize
72KB
-
memory/1764-921-0x0000000007ED0000-0x0000000007FDA000-memory.dmpFilesize
1.0MB
-
memory/1764-922-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/1764-923-0x0000000007FE0000-0x000000000801E000-memory.dmpFilesize
248KB
-
memory/1764-924-0x0000000008070000-0x00000000080BB000-memory.dmpFilesize
300KB
-
memory/1764-925-0x0000000008300000-0x0000000008366000-memory.dmpFilesize
408KB
-
memory/1764-926-0x0000000008990000-0x0000000008A22000-memory.dmpFilesize
584KB
-
memory/1764-927-0x0000000008CC0000-0x0000000008D36000-memory.dmpFilesize
472KB
-
memory/1764-928-0x0000000008D70000-0x0000000008D8E000-memory.dmpFilesize
120KB
-
memory/1764-930-0x0000000008E40000-0x0000000009002000-memory.dmpFilesize
1.8MB
-
memory/1764-931-0x0000000009010000-0x000000000953C000-memory.dmpFilesize
5.2MB
-
memory/1764-932-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/1764-933-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB