Analysis

  • max time kernel
    56s
  • max time network
    68s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-en
  • resource tags

    arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-06-2023 12:55

General

  • Target

    0131cd12971de84c8d7d025a1d670a530bc1d75530cf010c52419bef49a591f5.exe

  • Size

    389KB

  • MD5

    276a811aa0d0746102cad470e00825ae

  • SHA1

    f291fd00930f55ffb96a21ad1d23c9ddda56da0e

  • SHA256

    0131cd12971de84c8d7d025a1d670a530bc1d75530cf010c52419bef49a591f5

  • SHA512

    9eca72b5bae752d5ab6869af711d007a3aa55cc2973e4d422a402ab8acb8f9dd05d9b701490c76fcd306023bb264ffd010caca5f4943b94af6e5723ae406ae11

  • SSDEEP

    12288:CT9E5ebhmeuXDBKm7gmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:Ce5xeuo3A6M

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0131cd12971de84c8d7d025a1d670a530bc1d75530cf010c52419bef49a591f5.exe
    "C:\Users\Admin\AppData\Local\Temp\0131cd12971de84c8d7d025a1d670a530bc1d75530cf010c52419bef49a591f5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2432-121-0x00000000001C0000-0x00000000001F0000-memory.dmp

    Filesize

    192KB

  • memory/2432-125-0x0000000002480000-0x0000000002486000-memory.dmp

    Filesize

    24KB

  • memory/2432-126-0x0000000009EB0000-0x000000000A4B6000-memory.dmp

    Filesize

    6.0MB

  • memory/2432-127-0x000000000A4C0000-0x000000000A5CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2432-128-0x000000000A5D0000-0x000000000A5E2000-memory.dmp

    Filesize

    72KB

  • memory/2432-129-0x000000000A5F0000-0x000000000A62E000-memory.dmp

    Filesize

    248KB

  • memory/2432-130-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/2432-131-0x000000000A6A0000-0x000000000A6EB000-memory.dmp

    Filesize

    300KB

  • memory/2432-132-0x000000000A7E0000-0x000000000A856000-memory.dmp

    Filesize

    472KB

  • memory/2432-133-0x000000000A860000-0x000000000A8F2000-memory.dmp

    Filesize

    584KB

  • memory/2432-134-0x000000000A900000-0x000000000ADFE000-memory.dmp

    Filesize

    5.0MB

  • memory/2432-135-0x000000000AF40000-0x000000000AFA6000-memory.dmp

    Filesize

    408KB

  • memory/2432-136-0x000000000B3E0000-0x000000000B5A2000-memory.dmp

    Filesize

    1.8MB

  • memory/2432-137-0x000000000B5C0000-0x000000000BAEC000-memory.dmp

    Filesize

    5.2MB

  • memory/2432-138-0x0000000000B20000-0x0000000000B70000-memory.dmp

    Filesize

    320KB

  • memory/2432-139-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB