Analysis

  • max time kernel
    126s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/07/2023, 19:39

General

  • Target

    fadf49176490c92667325c5051cf09e517df5405c10dd862a8940d2e38042e14.exe

  • Size

    251KB

  • MD5

    3348f71bd92dde7b2a450cfd9cccf378

  • SHA1

    ae03597f4aa2c1a946400a3fcefa5627ac8b37b4

  • SHA256

    fadf49176490c92667325c5051cf09e517df5405c10dd862a8940d2e38042e14

  • SHA512

    d62b13ff9d88207f5f5009383c71bb42589eeb1eb775b3852b3eab2971b38df17b9e15d3d46e31364b18413a723c855c258aa9502f4a5e309ff1818a405239cf

  • SSDEEP

    6144:mLdszMkZ/7e4vIrril4yLRT8656XeYsvbXSl:mSgktq4vI3U4oRT86YQvu

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

194.26.135.162:2920

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fadf49176490c92667325c5051cf09e517df5405c10dd862a8940d2e38042e14.exe
    "C:\Users\Admin\AppData\Local\Temp\fadf49176490c92667325c5051cf09e517df5405c10dd862a8940d2e38042e14.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:356

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/356-119-0x0000000000520000-0x0000000000620000-memory.dmp

          Filesize

          1024KB

        • memory/356-120-0x0000000000400000-0x00000000004F9000-memory.dmp

          Filesize

          996KB

        • memory/356-121-0x0000000000660000-0x000000000069D000-memory.dmp

          Filesize

          244KB

        • memory/356-123-0x0000000073480000-0x0000000073B6E000-memory.dmp

          Filesize

          6.9MB

        • memory/356-122-0x00000000022D0000-0x00000000022FC000-memory.dmp

          Filesize

          176KB

        • memory/356-124-0x0000000002570000-0x0000000002580000-memory.dmp

          Filesize

          64KB

        • memory/356-125-0x0000000002570000-0x0000000002580000-memory.dmp

          Filesize

          64KB

        • memory/356-126-0x0000000002570000-0x0000000002580000-memory.dmp

          Filesize

          64KB

        • memory/356-127-0x0000000004C20000-0x000000000511E000-memory.dmp

          Filesize

          5.0MB

        • memory/356-128-0x00000000026C0000-0x00000000026E8000-memory.dmp

          Filesize

          160KB

        • memory/356-129-0x0000000005120000-0x0000000005726000-memory.dmp

          Filesize

          6.0MB

        • memory/356-130-0x0000000005770000-0x0000000005782000-memory.dmp

          Filesize

          72KB

        • memory/356-131-0x00000000057A0000-0x00000000058AA000-memory.dmp

          Filesize

          1.0MB

        • memory/356-132-0x0000000000400000-0x00000000004F9000-memory.dmp

          Filesize

          996KB

        • memory/356-133-0x0000000002570000-0x0000000002580000-memory.dmp

          Filesize

          64KB

        • memory/356-134-0x00000000058B0000-0x00000000058EE000-memory.dmp

          Filesize

          248KB

        • memory/356-135-0x0000000005930000-0x000000000597B000-memory.dmp

          Filesize

          300KB

        • memory/356-136-0x0000000005BD0000-0x0000000005C36000-memory.dmp

          Filesize

          408KB

        • memory/356-137-0x0000000006260000-0x00000000062F2000-memory.dmp

          Filesize

          584KB

        • memory/356-138-0x0000000006310000-0x0000000006386000-memory.dmp

          Filesize

          472KB

        • memory/356-139-0x0000000006400000-0x00000000065C2000-memory.dmp

          Filesize

          1.8MB

        • memory/356-140-0x00000000065D0000-0x0000000006AFC000-memory.dmp

          Filesize

          5.2MB

        • memory/356-141-0x0000000000520000-0x0000000000620000-memory.dmp

          Filesize

          1024KB

        • memory/356-142-0x0000000006C20000-0x0000000006C3E000-memory.dmp

          Filesize

          120KB

        • memory/356-143-0x0000000073480000-0x0000000073B6E000-memory.dmp

          Filesize

          6.9MB

        • memory/356-145-0x0000000000400000-0x00000000004F9000-memory.dmp

          Filesize

          996KB

        • memory/356-146-0x0000000073480000-0x0000000073B6E000-memory.dmp

          Filesize

          6.9MB