Analysis
-
max time kernel
22s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
16-01-2021 07:27
Static task
static1
Behavioral task
behavioral1
Sample
318655bc5bd250d8a0b65715330aa78f.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
318655bc5bd250d8a0b65715330aa78f.exe
Resource
win10v20201028
General
-
Target
318655bc5bd250d8a0b65715330aa78f.exe
-
Size
296KB
-
MD5
318655bc5bd250d8a0b65715330aa78f
-
SHA1
008edde78a5ba7970025ffe34cc17296232e52d0
-
SHA256
6380b6aacedc8b0dd90421a7cd2d933d8e5f546497699fd03dd4ce3983d57248
-
SHA512
2761729e054a396895eb41bc5ea99e3d0dc24d00858f02fb83ea815005f8d427ca4473e67f1ed551d97692235e0c15e015323c3057f20296298c87382a9693db
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1080-6-0x0000000006AF0000-0x0000000006B19000-memory.dmp family_redline behavioral2/memory/1080-8-0x0000000009340000-0x0000000009367000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
318655bc5bd250d8a0b65715330aa78f.exepid process 1080 318655bc5bd250d8a0b65715330aa78f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
318655bc5bd250d8a0b65715330aa78f.exedescription pid process Token: SeDebugPrivilege 1080 318655bc5bd250d8a0b65715330aa78f.exe