Analysis
-
max time kernel
50s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-03-2023 10:42
Static task
static1
General
-
Target
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exe
-
Size
348KB
-
MD5
a09acd6077fdbf61a923164fc53177dc
-
SHA1
4e1b866d6d141973279133afaf955c814a3a2954
-
SHA256
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe
-
SHA512
299d9c610e20e8a27e1aacb9c1319985dd89ec2cc21a6329da27e378c1c6998ee19f5a5acbc623ad8ae5b1ea236287c3ccb11bff4da7466e579be5345c95e0f4
-
SSDEEP
6144:2ztLLGL0k61GTfTzu8YYWXbVYyvLj5BcGJpR4J7r4rvv7gSZ1Ks:SLLGQk61aTaFfpYOLNBNLR49r47v8SZM
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/2064-123-0x0000000004E10000-0x0000000004E6A000-memory.dmp family_redline behavioral1/memory/2064-124-0x00000000028C0000-0x00000000028D0000-memory.dmp family_redline behavioral1/memory/2064-126-0x0000000005370000-0x00000000053C8000-memory.dmp family_redline behavioral1/memory/2064-129-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-130-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-132-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-134-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-136-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-138-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-140-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-142-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-144-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-146-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-148-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-150-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-154-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-152-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-156-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-158-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-160-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-162-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-164-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-166-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-168-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-170-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-172-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-174-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-176-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-178-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-180-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-182-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-184-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-186-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-188-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-190-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/2064-192-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exepid process 2064 779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exe 2064 779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exedescription pid process Token: SeDebugPrivilege 2064 779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exe"C:\Users\Admin\AppData\Local\Temp\779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2064-122-0x00000000024C0000-0x0000000002522000-memory.dmpFilesize
392KB
-
memory/2064-123-0x0000000004E10000-0x0000000004E6A000-memory.dmpFilesize
360KB
-
memory/2064-124-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/2064-125-0x0000000004E70000-0x000000000536E000-memory.dmpFilesize
5.0MB
-
memory/2064-126-0x0000000005370000-0x00000000053C8000-memory.dmpFilesize
352KB
-
memory/2064-127-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/2064-128-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/2064-129-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-130-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-132-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-134-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-136-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-138-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-140-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-142-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-144-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-146-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-148-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-150-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-154-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-152-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-156-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-158-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-160-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-162-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-164-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-166-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-168-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-170-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-172-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-174-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-176-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-178-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-180-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-182-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-184-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-186-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-188-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-190-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-192-0x0000000005370000-0x00000000053C2000-memory.dmpFilesize
328KB
-
memory/2064-919-0x00000000053D0000-0x00000000059D6000-memory.dmpFilesize
6.0MB
-
memory/2064-920-0x0000000005A30000-0x0000000005A42000-memory.dmpFilesize
72KB
-
memory/2064-921-0x0000000005A60000-0x0000000005B6A000-memory.dmpFilesize
1.0MB
-
memory/2064-922-0x0000000005B70000-0x0000000005BAE000-memory.dmpFilesize
248KB
-
memory/2064-923-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/2064-924-0x0000000005C00000-0x0000000005C4B000-memory.dmpFilesize
300KB
-
memory/2064-925-0x0000000005E90000-0x0000000005EF6000-memory.dmpFilesize
408KB
-
memory/2064-926-0x0000000006540000-0x00000000065D2000-memory.dmpFilesize
584KB
-
memory/2064-927-0x00000000065F0000-0x0000000006666000-memory.dmpFilesize
472KB
-
memory/2064-928-0x0000000006740000-0x0000000006902000-memory.dmpFilesize
1.8MB
-
memory/2064-930-0x0000000006910000-0x0000000006E3C000-memory.dmpFilesize
5.2MB
-
memory/2064-931-0x0000000006EE0000-0x0000000006EFE000-memory.dmpFilesize
120KB
-
memory/2064-932-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/2064-933-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/2064-934-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB