Analysis

  • max time kernel
    89s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-05-2024 20:30

General

  • Target

    32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe

  • Size

    315KB

  • MD5

    8593635e7692a063e8ffdf017a1b8b7f

  • SHA1

    efcd70922a3d3577e617ff3fe78bbeeca43648e7

  • SHA256

    32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82

  • SHA512

    bd46e1344bb1c577260517fbecd126942b56b7e69c476af8ef6c3f104d96c3e5e1277be974b678af490a957ce6d3bbf7ad0f99911dc3dc68606a4981affe1c16

  • SSDEEP

    6144:mi9pI60nbM8uPZy3+8KIDFquxMFQEjKP1dN9Vm8D5p9PGP0FXHS:/9+60nbnu6qaE7ePrN9D5p9nHS

Malware Config

Extracted

Family

redline

Botnet

708370717

C2

https://pastebin.com/raw/KE5Mft0T

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe
    "C:\Users\Admin\AppData\Local\Temp\32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4848
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/596-8-0x0000000006400000-0x000000000643C000-memory.dmp

      Filesize

      240KB

    • memory/596-2-0x00000000746DE000-0x00000000746DF000-memory.dmp

      Filesize

      4KB

    • memory/596-9-0x0000000006C70000-0x0000000006CBC000-memory.dmp

      Filesize

      304KB

    • memory/596-10-0x0000000006F90000-0x0000000007152000-memory.dmp

      Filesize

      1.8MB

    • memory/596-4-0x0000000006450000-0x0000000006A68000-memory.dmp

      Filesize

      6.1MB

    • memory/596-5-0x0000000005E30000-0x0000000005E42000-memory.dmp

      Filesize

      72KB

    • memory/596-6-0x0000000005F60000-0x000000000606A000-memory.dmp

      Filesize

      1.0MB

    • memory/596-7-0x00000000746D0000-0x0000000074E81000-memory.dmp

      Filesize

      7.7MB

    • memory/596-18-0x00000000746D0000-0x0000000074E81000-memory.dmp

      Filesize

      7.7MB

    • memory/596-0-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/596-3-0x00000000058E0000-0x0000000005946000-memory.dmp

      Filesize

      408KB

    • memory/596-11-0x0000000007690000-0x0000000007BBC000-memory.dmp

      Filesize

      5.2MB

    • memory/596-12-0x0000000008170000-0x0000000008716000-memory.dmp

      Filesize

      5.6MB

    • memory/596-13-0x0000000007340000-0x00000000073D2000-memory.dmp

      Filesize

      584KB

    • memory/596-14-0x0000000007460000-0x00000000074D6000-memory.dmp

      Filesize

      472KB

    • memory/596-15-0x00000000073E0000-0x00000000073FE000-memory.dmp

      Filesize

      120KB

    • memory/596-16-0x0000000007E10000-0x0000000007E60000-memory.dmp

      Filesize

      320KB

    • memory/3452-1-0x00000000011F0000-0x00000000011F1000-memory.dmp

      Filesize

      4KB