Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 04:30

General

  • Target

    qu9158.exe

  • Size

    379KB

  • MD5

    23c005bf6be262973e85b907f5933589

  • SHA1

    3074e75a7dd20983887699504aee438050f2d988

  • SHA256

    b1c19714909ee44027c6b4b71d475eef2c4518851ecdc149fa85f219a43f5cb3

  • SHA512

    7516526d2dc56ad6a1bc9255fd63c9ba910042e8c110ca53a684b39d74e204b84784b64640e397e9e51eacddbe1c986114124aa943d2862cd52be2d046bc7f59

  • SSDEEP

    6144:Tbvgogp56pv5kHidlxQTx4F97PPoFIkenFZG1nr:TTghpYpvOCVLLsZqFgr

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 38 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qu9158.exe
    "C:\Users\Admin\AppData\Local\Temp\qu9158.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1236

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1236-55-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/1236-56-0x0000000004510000-0x0000000004556000-memory.dmp

    Filesize

    280KB

  • memory/1236-57-0x00000000047E0000-0x0000000004824000-memory.dmp

    Filesize

    272KB

  • memory/1236-58-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-59-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-61-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-63-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-67-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-65-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-71-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-69-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-75-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-73-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-77-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-83-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-82-0x0000000007120000-0x0000000007160000-memory.dmp

    Filesize

    256KB

  • memory/1236-80-0x0000000007120000-0x0000000007160000-memory.dmp

    Filesize

    256KB

  • memory/1236-79-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-87-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-85-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-91-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-89-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-93-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-97-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-95-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-99-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-103-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-101-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-105-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-109-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-107-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-111-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-113-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-115-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-119-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-117-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-123-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-121-0x00000000047E0000-0x000000000481E000-memory.dmp

    Filesize

    248KB

  • memory/1236-966-0x0000000007120000-0x0000000007160000-memory.dmp

    Filesize

    256KB

  • memory/1236-968-0x0000000007120000-0x0000000007160000-memory.dmp

    Filesize

    256KB