Analysis
-
max time kernel
56s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 18:37
Static task
static1
General
-
Target
2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e.exe
-
Size
313KB
-
MD5
ce242823bfc1b0daca65e4a8668966e5
-
SHA1
e1d992d537c3dd7340f6dc04e5d7d171e2981c1d
-
SHA256
2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e
-
SHA512
0a0cff18872a65327cc1ccd730050cb899f5e3cea7db96ac343566bb82f42fe54b31ec9d46f1ee1e596855b35436f12e054695f0c75b0973f6043d54dc59a51e
-
SSDEEP
6144:VGrC/DgPCCG0QSw3oX5ZP8PFyig9pgWH5Ga:saD8CCG0Fw3W5ZkNip5ZG
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3232-118-0x0000000002310000-0x000000000236A000-memory.dmp family_redline behavioral1/memory/3232-120-0x00000000050E0000-0x0000000005138000-memory.dmp family_redline behavioral1/memory/3232-125-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-126-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-128-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-130-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-132-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-134-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-138-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-136-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-140-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-142-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-144-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-146-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-148-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-150-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-152-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-154-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-156-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-158-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-160-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-162-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-164-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-166-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-168-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-170-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-172-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-176-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-178-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-174-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-180-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-182-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-184-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-186-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline behavioral1/memory/3232-188-0x00000000050E0000-0x0000000005132000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e.exepid process 3232 2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e.exedescription pid process Token: SeDebugPrivilege 3232 2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e.exe"C:\Users\Admin\AppData\Local\Temp\2424fce48642c5cd8272c92b08a92b7364ad5950ac714f2e0eff7f40ff10c03e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3232-118-0x0000000002310000-0x000000000236A000-memory.dmpFilesize
360KB
-
memory/3232-119-0x0000000004BA0000-0x000000000509E000-memory.dmpFilesize
5.0MB
-
memory/3232-120-0x00000000050E0000-0x0000000005138000-memory.dmpFilesize
352KB
-
memory/3232-123-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/3232-122-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/3232-124-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/3232-121-0x0000000000660000-0x00000000006C2000-memory.dmpFilesize
392KB
-
memory/3232-125-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-126-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-128-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-130-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-132-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-134-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-138-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-136-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-140-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-142-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-144-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-146-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-148-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-150-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-152-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-154-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-156-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-158-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-160-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-162-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-164-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-166-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-168-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-170-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-172-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-176-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-178-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-174-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-180-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-182-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-184-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-186-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-188-0x00000000050E0000-0x0000000005132000-memory.dmpFilesize
328KB
-
memory/3232-915-0x0000000005750000-0x0000000005D56000-memory.dmpFilesize
6.0MB
-
memory/3232-916-0x00000000051C0000-0x00000000051D2000-memory.dmpFilesize
72KB
-
memory/3232-917-0x00000000051F0000-0x00000000052FA000-memory.dmpFilesize
1.0MB
-
memory/3232-918-0x0000000005300000-0x000000000533E000-memory.dmpFilesize
248KB
-
memory/3232-919-0x0000000005390000-0x00000000053DB000-memory.dmpFilesize
300KB
-
memory/3232-920-0x0000000002230000-0x0000000002240000-memory.dmpFilesize
64KB
-
memory/3232-921-0x0000000005620000-0x0000000005686000-memory.dmpFilesize
408KB
-
memory/3232-922-0x00000000062E0000-0x0000000006372000-memory.dmpFilesize
584KB
-
memory/3232-923-0x0000000006390000-0x0000000006406000-memory.dmpFilesize
472KB
-
memory/3232-924-0x00000000064E0000-0x00000000066A2000-memory.dmpFilesize
1.8MB
-
memory/3232-925-0x00000000066B0000-0x0000000006BDC000-memory.dmpFilesize
5.2MB
-
memory/3232-926-0x0000000006C80000-0x0000000006C9E000-memory.dmpFilesize
120KB