Analysis
-
max time kernel
20s -
max time network
19s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-12-2020 19:19
Static task
static1
Behavioral task
behavioral1
Sample
1c55d28dcdcf93370495635d3d64e2fd.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1c55d28dcdcf93370495635d3d64e2fd.exe
Resource
win10v20201028
General
-
Target
1c55d28dcdcf93370495635d3d64e2fd.exe
-
Size
382KB
-
MD5
1c55d28dcdcf93370495635d3d64e2fd
-
SHA1
84505c3ae38421fa4dc6017c8d7e27e9b106cdc9
-
SHA256
2ec7c847f0688dff3229c676bb15e88e1c576bcb67157341887ffc3a20375190
-
SHA512
5458491818e243db6fca35d448942ef97cf71e946e3b18c14a6db3e90cd5608f5ecfdeef70303cad2819c33a62fe3dcb884fbdd12e09b24fd02bd6a6ecdac4c6
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1824-5-0x0000000000BD0000-0x0000000000BF4000-memory.dmp family_redline behavioral1/memory/1824-6-0x00000000029D0000-0x00000000029F3000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 checkip.amazonaws.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1c55d28dcdcf93370495635d3d64e2fd.exepid process 1824 1c55d28dcdcf93370495635d3d64e2fd.exe 1824 1c55d28dcdcf93370495635d3d64e2fd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1c55d28dcdcf93370495635d3d64e2fd.exedescription pid process Token: SeDebugPrivilege 1824 1c55d28dcdcf93370495635d3d64e2fd.exe