Analysis
-
max time kernel
19s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-12-2020 20:40
Static task
static1
Behavioral task
behavioral1
Sample
7a26a67ab1c2f27b3228d6441a5fcb0e.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
7a26a67ab1c2f27b3228d6441a5fcb0e.exe
Resource
win10v20201028
General
-
Target
7a26a67ab1c2f27b3228d6441a5fcb0e.exe
-
Size
264KB
-
MD5
7a26a67ab1c2f27b3228d6441a5fcb0e
-
SHA1
4b3378ca2582b1d0720c606c4433cb4dcabbe5ea
-
SHA256
f5cdc7b8d5cd7b9f4ca29e9c229365400a6b74101f4490e940a89f52d9b4d47a
-
SHA512
b37520fe11c1d47753436843aabb0a0a31262f9dc5ea8ea7b1a4c401bdec08d53656672816a12034d6eeb7c92261484047d3120d1b54ab1ac9b8e79f6eda2616
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3988-6-0x00000000021F0000-0x0000000002214000-memory.dmp family_redline behavioral2/memory/3988-8-0x0000000004A40000-0x0000000004A63000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 checkip.amazonaws.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7a26a67ab1c2f27b3228d6441a5fcb0e.exepid process 3988 7a26a67ab1c2f27b3228d6441a5fcb0e.exe 3988 7a26a67ab1c2f27b3228d6441a5fcb0e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7a26a67ab1c2f27b3228d6441a5fcb0e.exedescription pid process Token: SeDebugPrivilege 3988 7a26a67ab1c2f27b3228d6441a5fcb0e.exe