Analysis
-
max time kernel
24s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-12-2020 18:27
Static task
static1
Behavioral task
behavioral1
Sample
07dce27f1c1d75686d86d902e33e8df0.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
07dce27f1c1d75686d86d902e33e8df0.exe
Resource
win10v20201028
General
-
Target
07dce27f1c1d75686d86d902e33e8df0.exe
-
Size
276KB
-
MD5
07dce27f1c1d75686d86d902e33e8df0
-
SHA1
1ad2ada10990980ec63fff7a08bf7a835a7b5767
-
SHA256
3f3dd442c0b26efea8723a8e435c80c5339261a0edac550364894223a43a9d51
-
SHA512
37b7795c3a8fdd24bcce02fc205b7ec439126e7d5ce9e9ffa227f29ece25569c575015d91ef73d7eb3dbe8177d728658c49bf2a696743198d3fc20dafb71c0df
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/756-6-0x00000000027E0000-0x0000000002805000-memory.dmp family_redline behavioral2/memory/756-8-0x0000000002850000-0x0000000002873000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 checkip.amazonaws.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
07dce27f1c1d75686d86d902e33e8df0.exepid process 756 07dce27f1c1d75686d86d902e33e8df0.exe 756 07dce27f1c1d75686d86d902e33e8df0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
07dce27f1c1d75686d86d902e33e8df0.exedescription pid process Token: SeDebugPrivilege 756 07dce27f1c1d75686d86d902e33e8df0.exe