Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230705-en
  • resource tags

    arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2023, 06:04 UTC

General

  • Target

    46b68d88ce375bb605818709d1845913.exe

  • Size

    1.3MB

  • MD5

    46b68d88ce375bb605818709d1845913

  • SHA1

    1f5118f3471f587f4f284634983642bd8b1f86d7

  • SHA256

    26a5a7eabb7b7a08a41ac73226e615bc272671efcaada75d4367386a125a152d

  • SHA512

    8d76986a442de0ceba49f23f3da1953ca41afb0ba9f751b4dc41474b8fab918aa97c835002da5768a5b25e7789be497e854d553308ea6ce1533373d7b357d331

  • SSDEEP

    24576:8USFKRmxaSBggiyQSpXQJnuJvH4IEPxxZmAS:8VF8IggiypGWvFAZmAS

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46b68d88ce375bb605818709d1845913.exe
    "C:\Users\Admin\AppData\Local\Temp\46b68d88ce375bb605818709d1845913.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2892

Network

    No results found
  • 77.91.68.70:19073
    46b68d88ce375bb605818709d1845913.exe
    9.3kB
    7.5kB
    30
    27
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2892-54-0x00000000001B0000-0x00000000001E0000-memory.dmp

    Filesize

    192KB

  • memory/2892-58-0x0000000001F60000-0x0000000001F66000-memory.dmp

    Filesize

    24KB

  • memory/2892-59-0x00000000047A0000-0x00000000047E0000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.