Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2023, 19:01

General

  • Target

    6f6d07ed35bc32b2a5e34d905d76758fadc5d096b0a47956f5f5a69d408d62a1_JC.exe

  • Size

    174KB

  • MD5

    7b77448ddadc48724dde08b816cdd3d7

  • SHA1

    c534225f5c56a8a61cac5245eee5175e1f64832d

  • SHA256

    6f6d07ed35bc32b2a5e34d905d76758fadc5d096b0a47956f5f5a69d408d62a1

  • SHA512

    b73ad24331376755f3bd2d36f24e137387d5c7b848c3f049ccb7e204ac467d7d6e135162cc360eff69d58fe16f301f4899caef737d5c7568b21b7b8b8552e16f

  • SSDEEP

    3072:DmKkkcwEPLJbJ++xCglHPLdfnNB/CEl1YlhKuWgpxIrG7jxo:CiQJ++xCkBfnN43h3kS7+

Malware Config

Extracted

Family

redline

Botnet

5380656782

C2

https://pastebin.com/raw/NgsUAPya

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f6d07ed35bc32b2a5e34d905d76758fadc5d096b0a47956f5f5a69d408d62a1_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6f6d07ed35bc32b2a5e34d905d76758fadc5d096b0a47956f5f5a69d408d62a1_JC.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1312-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1312-54-0x00000000003C0000-0x00000000003DE000-memory.dmp

    Filesize

    120KB

  • memory/1312-59-0x0000000073B60000-0x000000007424E000-memory.dmp

    Filesize

    6.9MB

  • memory/1312-60-0x00000000047F0000-0x0000000004830000-memory.dmp

    Filesize

    256KB

  • memory/1312-62-0x0000000073B60000-0x000000007424E000-memory.dmp

    Filesize

    6.9MB