Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
16-01-2021 07:29
Static task
static1
Behavioral task
behavioral1
Sample
62a673b9a25cc6b1bb6d7d010e206cc5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
62a673b9a25cc6b1bb6d7d010e206cc5.exe
Resource
win10v20201028
General
-
Target
62a673b9a25cc6b1bb6d7d010e206cc5.exe
-
Size
344KB
-
MD5
62a673b9a25cc6b1bb6d7d010e206cc5
-
SHA1
e0c91f3ff756d9ef92e196a8243a314c8da6367d
-
SHA256
fa123f422564ed8b12034d2fdecbafb53d8df264aa6d0fbfadaddd89c9e5ac5d
-
SHA512
688e9023423a3afc7fded4c255dbb75510a2889c264439b9960afc78932dc5b5bf36899517eb21ddcd855a9f516f82ac4691746c42ff13ba943a617f384ca22a
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1204-6-0x00000000061B0000-0x00000000061D9000-memory.dmp family_redline behavioral1/memory/1204-12-0x00000000062F0000-0x0000000006317000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
62a673b9a25cc6b1bb6d7d010e206cc5.exepid process 1204 62a673b9a25cc6b1bb6d7d010e206cc5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
62a673b9a25cc6b1bb6d7d010e206cc5.exedescription pid process Token: SeDebugPrivilege 1204 62a673b9a25cc6b1bb6d7d010e206cc5.exe