Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2023, 18:25

General

  • Target

    bb8b0862c3c8ac468a57d9ae32f873f2.exe

  • Size

    418KB

  • MD5

    bb8b0862c3c8ac468a57d9ae32f873f2

  • SHA1

    fbfd4eb8fce8ac49938ad33da602227bdfdfc0e6

  • SHA256

    498ce4ddc627a2b95a11ab521c9314fbe975d5aa4de496792906fe7bb8ce64e0

  • SHA512

    bc6f359c99257b20fc85d9f9e0e0ac9a1f4fbad37c6b97bf4504bf945b05e60d59643df5cbcc1d87df7e59345cac0a5e17c2cb8e4855ae3c9ade66ccab3c42dc

  • SSDEEP

    6144:Uj6yKNstxo6mjbLLi7LLccO28qrVO2l5vlR4CX1SvihNAI:UpDtxZEsdBN5v3rXainAI

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb8b0862c3c8ac468a57d9ae32f873f2.exe
    "C:\Users\Admin\AppData\Local\Temp\bb8b0862c3c8ac468a57d9ae32f873f2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3108-133-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3108-134-0x00000000021E0000-0x000000000223A000-memory.dmp

    Filesize

    360KB

  • memory/3108-138-0x0000000074D30000-0x00000000754E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3108-139-0x0000000007000000-0x00000000075A4000-memory.dmp

    Filesize

    5.6MB

  • memory/3108-140-0x00000000075F0000-0x0000000007682000-memory.dmp

    Filesize

    584KB

  • memory/3108-141-0x00000000076E0000-0x00000000076F0000-memory.dmp

    Filesize

    64KB

  • memory/3108-142-0x0000000007820000-0x000000000782A000-memory.dmp

    Filesize

    40KB

  • memory/3108-143-0x0000000008280000-0x0000000008898000-memory.dmp

    Filesize

    6.1MB

  • memory/3108-144-0x00000000078E0000-0x00000000078F2000-memory.dmp

    Filesize

    72KB

  • memory/3108-145-0x0000000007900000-0x0000000007A0A000-memory.dmp

    Filesize

    1.0MB

  • memory/3108-146-0x0000000007A10000-0x0000000007A4C000-memory.dmp

    Filesize

    240KB

  • memory/3108-147-0x0000000007C60000-0x0000000007CC6000-memory.dmp

    Filesize

    408KB

  • memory/3108-148-0x00000000081E0000-0x0000000008256000-memory.dmp

    Filesize

    472KB

  • memory/3108-149-0x0000000008BE0000-0x0000000008DA2000-memory.dmp

    Filesize

    1.8MB

  • memory/3108-150-0x0000000008DB0000-0x00000000092DC000-memory.dmp

    Filesize

    5.2MB

  • memory/3108-151-0x00000000093E0000-0x00000000093FE000-memory.dmp

    Filesize

    120KB

  • memory/3108-152-0x00000000046A0000-0x00000000046F0000-memory.dmp

    Filesize

    320KB

  • memory/3108-155-0x0000000074D30000-0x00000000754E0000-memory.dmp

    Filesize

    7.7MB