Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2023 01:55
Behavioral task
behavioral1
Sample
dcc71fdacb65262d4a707bc1aaba72bb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dcc71fdacb65262d4a707bc1aaba72bb.exe
Resource
win10v2004-20230220-en
General
-
Target
dcc71fdacb65262d4a707bc1aaba72bb.exe
-
Size
145KB
-
MD5
dcc71fdacb65262d4a707bc1aaba72bb
-
SHA1
0f3b4c5203f43319442c096d8c3c6ea2de826e92
-
SHA256
7f80912d52e1ecf2f90cf835fac4e6799aea697fba7969775f8e6e263263f41c
-
SHA512
9b9bb87c056a38240395e0e9c212afa02b154a8f1c1b99721b3afe4ecae79f127d5344f4d062f7ea379574a56b45ecf153087d91e429025caedc60b699e036d9
-
SSDEEP
3072:yV+m5cZQmRSJyq2G7z+Ued26U+QEThhZ98e8h4:yjcWnC1PCEThhH
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1648 3304 WerFault.exe dcc71fdacb65262d4a707bc1aaba72bb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc71fdacb65262d4a707bc1aaba72bb.exe"C:\Users\Admin\AppData\Local\Temp\dcc71fdacb65262d4a707bc1aaba72bb.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 7722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3304 -ip 33041⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3304-133-0x0000000000A10000-0x0000000000A3A000-memory.dmpFilesize
168KB