Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2023 20:36
Behavioral task
behavioral1
Sample
1d3e10adc7685d83f72d99f44fe63a27.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1d3e10adc7685d83f72d99f44fe63a27.exe
Resource
win10v2004-20230703-en
General
-
Target
1d3e10adc7685d83f72d99f44fe63a27.exe
-
Size
172KB
-
MD5
1d3e10adc7685d83f72d99f44fe63a27
-
SHA1
f882c4b68aac7366d434bfc7f2936d24e9ac0e21
-
SHA256
747a43c82c4a13158da7adc6634bae72b5b7aafcd9214cbd2694bf5d60999369
-
SHA512
90def681e0084198765f10e29e3c4abc7e256bf796cd84639ca60f2b09d6fc19e8294f49b23e7f9a201e99b3705b4123256b3393cbc2b8277648c575f6d4d460
-
SSDEEP
1536:lAMV836sv0W7T/lwNrH3LJEpdqkOmcAiPxNAhYQH1bu9NuyKQJ9Q50GkRI8e8h+:aE+dmLenqkLchPxNHgyXxJ9Q5r8e8h+
Malware Config
Extracted
redline
280723_red_FOX
85.209.3.10:11615
-
auth_value
f1e4c42c7ec8a1eb87a921a947333d06
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1d3e10adc7685d83f72d99f44fe63a27.exepid process 4464 1d3e10adc7685d83f72d99f44fe63a27.exe 4464 1d3e10adc7685d83f72d99f44fe63a27.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1d3e10adc7685d83f72d99f44fe63a27.exedescription pid process Token: SeDebugPrivilege 4464 1d3e10adc7685d83f72d99f44fe63a27.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4464-133-0x0000000074DB0000-0x0000000075560000-memory.dmpFilesize
7.7MB
-
memory/4464-134-0x0000000000EF0000-0x0000000000F20000-memory.dmpFilesize
192KB
-
memory/4464-135-0x0000000074DB0000-0x0000000075560000-memory.dmpFilesize
7.7MB
-
memory/4464-136-0x0000000005F90000-0x00000000065A8000-memory.dmpFilesize
6.1MB
-
memory/4464-137-0x0000000005A80000-0x0000000005B8A000-memory.dmpFilesize
1.0MB
-
memory/4464-138-0x0000000005960000-0x0000000005970000-memory.dmpFilesize
64KB
-
memory/4464-139-0x00000000059B0000-0x00000000059C2000-memory.dmpFilesize
72KB
-
memory/4464-140-0x0000000005A10000-0x0000000005A4C000-memory.dmpFilesize
240KB
-
memory/4464-141-0x0000000005D20000-0x0000000005D96000-memory.dmpFilesize
472KB
-
memory/4464-142-0x0000000005E40000-0x0000000005ED2000-memory.dmpFilesize
584KB
-
memory/4464-143-0x0000000007050000-0x00000000075F4000-memory.dmpFilesize
5.6MB
-
memory/4464-144-0x00000000066B0000-0x0000000006716000-memory.dmpFilesize
408KB
-
memory/4464-145-0x0000000005960000-0x0000000005970000-memory.dmpFilesize
64KB
-
memory/4464-146-0x00000000077D0000-0x0000000007992000-memory.dmpFilesize
1.8MB
-
memory/4464-147-0x0000000008220000-0x000000000874C000-memory.dmpFilesize
5.2MB
-
memory/4464-149-0x0000000074DB0000-0x0000000075560000-memory.dmpFilesize
7.7MB