Analysis Overview
SHA256
c0c1bda204a11b82eb5422d0b082ff03c2ea57a6af58ec264f816967d382943d
Threat Level: Known bad
The file 2888-62-0x00000000025C0000-0x00000000025F4000-memory.dmp was found to be: Known bad.
Malicious Activity Summary
Redline family
RedLine
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-07-23 07:36
Signatures
Redline family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-07-23 07:36
Reported
2023-07-23 07:39
Platform
win7-20230712-en
Max time kernel
118s
Max time network
128s
Command Line
Signatures
RedLine
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe
"C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe"
Network
| Country | Destination | Domain | Proto |
| FR | 178.32.90.250:29608 | tcp |
Files
memory/2796-54-0x00000000010D0000-0x0000000001104000-memory.dmp
memory/2796-55-0x0000000074280000-0x000000007496E000-memory.dmp
memory/2796-56-0x0000000000330000-0x0000000000336000-memory.dmp
memory/2796-57-0x0000000004960000-0x00000000049A0000-memory.dmp
memory/2796-58-0x0000000074280000-0x000000007496E000-memory.dmp
memory/2796-59-0x0000000004960000-0x00000000049A0000-memory.dmp
memory/2796-60-0x0000000074280000-0x000000007496E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-07-23 07:36
Reported
2023-07-23 07:39
Platform
win10v2004-20230703-en
Max time kernel
141s
Max time network
132s
Command Line
Signatures
RedLine
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe
"C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 254.177.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| FR | 178.32.90.250:29608 | tcp | |
| US | 8.8.8.8:53 | 250.90.32.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.8.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 161.252.72.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 211.143.182.52.in-addr.arpa | udp |
Files
memory/2220-133-0x00000000009E0000-0x0000000000A14000-memory.dmp
memory/2220-134-0x0000000074F70000-0x0000000075720000-memory.dmp
memory/2220-135-0x0000000005AE0000-0x00000000060F8000-memory.dmp
memory/2220-136-0x00000000055D0000-0x00000000056DA000-memory.dmp
memory/2220-137-0x00000000054C0000-0x00000000054D2000-memory.dmp
memory/2220-138-0x00000000053B0000-0x00000000053C0000-memory.dmp
memory/2220-139-0x0000000005520000-0x000000000555C000-memory.dmp
memory/2220-140-0x0000000005820000-0x0000000005896000-memory.dmp
memory/2220-141-0x0000000005940000-0x00000000059D2000-memory.dmp
memory/2220-142-0x0000000006BA0000-0x0000000007144000-memory.dmp
memory/2220-143-0x00000000059E0000-0x0000000005A46000-memory.dmp
memory/2220-144-0x0000000074F70000-0x0000000075720000-memory.dmp
memory/2220-145-0x0000000006470000-0x00000000064C0000-memory.dmp
memory/2220-146-0x00000000053B0000-0x00000000053C0000-memory.dmp
memory/2220-147-0x00000000069C0000-0x0000000006B82000-memory.dmp
memory/2220-148-0x0000000008D70000-0x000000000929C000-memory.dmp
memory/2220-150-0x0000000074F70000-0x0000000075720000-memory.dmp