Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2023 01:06

General

  • Target

    3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe

  • Size

    395KB

  • MD5

    1f42845cc77788cdff450881958e68a4

  • SHA1

    4c9dcbb076b6da2f49ac5d9f8f20aa2c1d428169

  • SHA256

    3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac

  • SHA512

    f87d1884ba6770040aa6485aa488d7e42fe4f10ad856245aeebe3d0bf7383f9e23cb40ef593e3a7c600454fc3685ff252930988a09d49cb3dd23b53e858b832f

  • SSDEEP

    3072:OkibvLmLAvc8bH+66gUljGecuHXacRsfeHlLCpeQdc6TXXLiGuLTTLkckC5WL6T:UjCLAbLovcrcBcpesPXXLiGYWRUySm

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe
    "C:\Users\Admin\AppData\Local\Temp\3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2388-56-0x0000000000300000-0x000000000033F000-memory.dmp

    Filesize

    252KB

  • memory/2388-55-0x0000000002510000-0x0000000002610000-memory.dmp

    Filesize

    1024KB

  • memory/2388-57-0x0000000000400000-0x0000000002435000-memory.dmp

    Filesize

    32.2MB

  • memory/2388-58-0x0000000004050000-0x0000000004088000-memory.dmp

    Filesize

    224KB

  • memory/2388-59-0x0000000073B70000-0x000000007425E000-memory.dmp

    Filesize

    6.9MB

  • memory/2388-61-0x0000000003E30000-0x0000000003E70000-memory.dmp

    Filesize

    256KB

  • memory/2388-60-0x0000000003E30000-0x0000000003E70000-memory.dmp

    Filesize

    256KB

  • memory/2388-62-0x00000000042F0000-0x0000000004324000-memory.dmp

    Filesize

    208KB

  • memory/2388-63-0x0000000003E20000-0x0000000003E26000-memory.dmp

    Filesize

    24KB

  • memory/2388-64-0x0000000003E30000-0x0000000003E70000-memory.dmp

    Filesize

    256KB

  • memory/2388-65-0x0000000002510000-0x0000000002610000-memory.dmp

    Filesize

    1024KB

  • memory/2388-66-0x0000000000400000-0x0000000002435000-memory.dmp

    Filesize

    32.2MB

  • memory/2388-67-0x0000000000300000-0x000000000033F000-memory.dmp

    Filesize

    252KB

  • memory/2388-69-0x0000000073B70000-0x000000007425E000-memory.dmp

    Filesize

    6.9MB

  • memory/2388-70-0x0000000003E30000-0x0000000003E70000-memory.dmp

    Filesize

    256KB

  • memory/2388-71-0x0000000003E30000-0x0000000003E70000-memory.dmp

    Filesize

    256KB

  • memory/2388-72-0x0000000000400000-0x0000000002435000-memory.dmp

    Filesize

    32.2MB

  • memory/2388-74-0x0000000002510000-0x0000000002610000-memory.dmp

    Filesize

    1024KB

  • memory/2388-75-0x0000000073B70000-0x000000007425E000-memory.dmp

    Filesize

    6.9MB