Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2023, 16:11

General

  • Target

    0x0009000000012325-78.exe

  • Size

    168KB

  • MD5

    dba05bdb23010a70db26ce0ff5d1d0ef

  • SHA1

    00bbcb8e698e800deeffeccf024f13b547cc3c0e

  • SHA256

    bce0d9b5cd087dc14268f04620d665211fce145c9dff396c63556c617d09d465

  • SHA512

    69121b484345141a3abae9df664e006069e1be642db3981eb7db9fc49291ac9730cbcdc1eff9c3b4c2f241cccc610d651123a022c77e4c9e723afad2d78217dd

  • SSDEEP

    1536:/9OLnP5teqhVZCGW5WwPwf8WTaj3zJJeunCxwSTGqVS5Wbu1RGwqHd384wYkp8eK:/8T3Ei8Wej9gWqVSYQRqHd388e8h3

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0009000000012325-78.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0009000000012325-78.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1380

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1380-54-0x00000000012B0000-0x00000000012DE000-memory.dmp

          Filesize

          184KB

        • memory/1380-55-0x00000000001F0000-0x00000000001F6000-memory.dmp

          Filesize

          24KB

        • memory/1380-56-0x0000000004B20000-0x0000000004B60000-memory.dmp

          Filesize

          256KB