Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2023, 08:38

General

  • Target

    0x000700000001aead-136.exe

  • Size

    145KB

  • MD5

    16967978aae9ed796aaa7b907d01a6f5

  • SHA1

    3be4d62a6e1600bb7f5bc389603b3674d5a2106b

  • SHA256

    477c5f6eb0101393256e0d8235322aa5cd4df5de0a6c2d26faf4f5ac1582609b

  • SHA512

    dc2a56695ca6e464ec9a94963d0a5b297e4ce3bc1ebdee9a960e6e6fe17ef27b800b7559667f3b88b1a2d9ce48e84dcd04df388f324fa286bb101178ba389e75

  • SSDEEP

    1536:FWBGlTP+mZP618EYDmRSNBg8sX72ZPGffuLEHKo8QJubueGJpfVT0wuei/qv+R+h:zV+m5c/QmRSNhGOy54SdVThDZt8e8hU

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19062

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000700000001aead-136.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000700000001aead-136.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1368

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1368-54-0x0000000000350000-0x000000000037A000-memory.dmp

          Filesize

          168KB

        • memory/1368-55-0x0000000004BD0000-0x0000000004C10000-memory.dmp

          Filesize

          256KB