Analysis
-
max time kernel
48s -
max time network
49s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
21-01-2021 07:09
Static task
static1
Behavioral task
behavioral1
Sample
1cee7f3e56ca6f40161af3f84c4972f2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1cee7f3e56ca6f40161af3f84c4972f2.exe
Resource
win10v20201028
General
-
Target
1cee7f3e56ca6f40161af3f84c4972f2.exe
-
Size
329KB
-
MD5
1cee7f3e56ca6f40161af3f84c4972f2
-
SHA1
9385a652b3f7f60c7c0028d8c4d176267b8a8edb
-
SHA256
57b01e75fdb6b0da38dd794744850e787ac069febb340eef4b3a5cf4760e6726
-
SHA512
a6761fb7fc3e9e48e8516307c9421536f0a51fb9bdcca59a0cc49daafbc8cdf550769c4dd559f8fedfb29a757545997937a384b72f2f735ecc38adcedc9b5127
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/804-8-0x00000000069D0000-0x00000000069F9000-memory.dmp family_redline behavioral1/memory/804-14-0x0000000006A00000-0x0000000006A28000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1cee7f3e56ca6f40161af3f84c4972f2.exepid process 804 1cee7f3e56ca6f40161af3f84c4972f2.exe 804 1cee7f3e56ca6f40161af3f84c4972f2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1cee7f3e56ca6f40161af3f84c4972f2.exedescription pid process Token: SeDebugPrivilege 804 1cee7f3e56ca6f40161af3f84c4972f2.exe