Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 18:09

General

  • Target

    0x000900000001230f68.exe

  • Size

    168KB

  • MD5

    b9c07af76480982b812057cf4210f749

  • SHA1

    a18b84addf21d4b27beaa9a2ea1b85a9d6753d8e

  • SHA256

    8ea79a5b7ee5f881abe0b72de07857bd94f0af45ef1c9971036fe0e9de2871b6

  • SHA512

    731440d982d16b5ee6109024bb9b7d64aa757a92712fbddf4ee490d3261fefe65c32adc7ac515bfd864912f1470a1ca59603c8b773daffd15e61e29d42c504b1

  • SSDEEP

    1536:Eq24CeDYZ5QqlVZRGWoysHrt3la3cOo+TGqV0buhoxW7/C6gX83wYk/8e8hK:EObYH2HaXEqVMVxI/C6gXh8e8hK

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000900000001230f68.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000900000001230f68.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2936-133-0x0000000000470000-0x000000000049E000-memory.dmp

          Filesize

          184KB

        • memory/2936-134-0x000000000A920000-0x000000000AF38000-memory.dmp

          Filesize

          6.1MB

        • memory/2936-135-0x000000000A410000-0x000000000A51A000-memory.dmp

          Filesize

          1.0MB

        • memory/2936-136-0x000000000A300000-0x000000000A312000-memory.dmp

          Filesize

          72KB

        • memory/2936-137-0x0000000004E70000-0x0000000004E80000-memory.dmp

          Filesize

          64KB

        • memory/2936-138-0x000000000A320000-0x000000000A35C000-memory.dmp

          Filesize

          240KB

        • memory/2936-139-0x000000000A760000-0x000000000A7D6000-memory.dmp

          Filesize

          472KB

        • memory/2936-140-0x000000000A880000-0x000000000A912000-memory.dmp

          Filesize

          584KB

        • memory/2936-141-0x000000000B4F0000-0x000000000BA94000-memory.dmp

          Filesize

          5.6MB

        • memory/2936-142-0x000000000AFB0000-0x000000000B016000-memory.dmp

          Filesize

          408KB

        • memory/2936-143-0x000000000B3B0000-0x000000000B400000-memory.dmp

          Filesize

          320KB

        • memory/2936-144-0x0000000004E70000-0x0000000004E80000-memory.dmp

          Filesize

          64KB

        • memory/2936-145-0x000000000BD70000-0x000000000BF32000-memory.dmp

          Filesize

          1.8MB

        • memory/2936-146-0x000000000C470000-0x000000000C99C000-memory.dmp

          Filesize

          5.2MB