Analysis
-
max time kernel
52s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-03-2023 08:24
Static task
static1
General
-
Target
20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exe
-
Size
347KB
-
MD5
7faf74300144c1f0328ff44b49852823
-
SHA1
3b28d1ccff42c9d89175ebb63ae70a6bcb8f6565
-
SHA256
20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062
-
SHA512
ee2222bbac4618d2328ef714fe8ab2446e30577ebbc2360286959b32879fc1806279d9bffb3a039664306ff8b8de903d57cd477b3860574ce7de1e9e326a7c89
-
SSDEEP
6144:PKCBLALEk6j34/mDP9o0iUd83AnY7aXXXpfXS:7BLAgk6joqdiUdXnYmXXXpfi
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3780-118-0x0000000004D90000-0x0000000004DEA000-memory.dmp family_redline behavioral1/memory/3780-122-0x0000000004E30000-0x0000000004E88000-memory.dmp family_redline behavioral1/memory/3780-123-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-126-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-124-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-128-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-130-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-132-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-134-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-136-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-138-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-140-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-142-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-144-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-146-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-148-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-150-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-152-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-154-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-156-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-158-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-160-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-162-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-164-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-166-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-168-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-170-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-172-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-174-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-176-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-178-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-180-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-182-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-184-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline behavioral1/memory/3780-186-0x0000000004E30000-0x0000000004E82000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exepid process 3780 20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exe 3780 20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exedescription pid process Token: SeDebugPrivilege 3780 20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exe"C:\Users\Admin\AppData\Local\Temp\20975f72dafc60bc883a0c0d376667c90cd32198752193bb261d8451485d0062.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3780-118-0x0000000004D90000-0x0000000004DEA000-memory.dmpFilesize
360KB
-
memory/3780-119-0x0000000002460000-0x00000000024C2000-memory.dmpFilesize
392KB
-
memory/3780-120-0x0000000004F20000-0x0000000004F30000-memory.dmpFilesize
64KB
-
memory/3780-121-0x0000000004F30000-0x000000000542E000-memory.dmpFilesize
5.0MB
-
memory/3780-122-0x0000000004E30000-0x0000000004E88000-memory.dmpFilesize
352KB
-
memory/3780-123-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-126-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-124-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-128-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-130-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-132-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-134-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-136-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-138-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-140-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-142-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-144-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-146-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-148-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-150-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-152-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-154-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-156-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-158-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-160-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-162-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-164-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-166-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-168-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-170-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-172-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-174-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-176-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-178-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-180-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-182-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-184-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-186-0x0000000004E30000-0x0000000004E82000-memory.dmpFilesize
328KB
-
memory/3780-913-0x0000000005430000-0x0000000005A36000-memory.dmpFilesize
6.0MB
-
memory/3780-914-0x0000000005A40000-0x0000000005A52000-memory.dmpFilesize
72KB
-
memory/3780-915-0x0000000005A60000-0x0000000005B6A000-memory.dmpFilesize
1.0MB
-
memory/3780-916-0x0000000005BB0000-0x0000000005BEE000-memory.dmpFilesize
248KB
-
memory/3780-917-0x0000000004F20000-0x0000000004F30000-memory.dmpFilesize
64KB
-
memory/3780-918-0x0000000005C00000-0x0000000005C4B000-memory.dmpFilesize
300KB
-
memory/3780-919-0x0000000005E90000-0x0000000005EF6000-memory.dmpFilesize
408KB
-
memory/3780-920-0x0000000006520000-0x00000000065B2000-memory.dmpFilesize
584KB
-
memory/3780-921-0x0000000006850000-0x00000000068C6000-memory.dmpFilesize
472KB
-
memory/3780-922-0x00000000069A0000-0x0000000006B62000-memory.dmpFilesize
1.8MB
-
memory/3780-923-0x0000000006B70000-0x000000000709C000-memory.dmpFilesize
5.2MB
-
memory/3780-924-0x0000000007140000-0x000000000715E000-memory.dmpFilesize
120KB