Analysis
-
max time kernel
25s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
25-07-2021 04:00
Static task
static1
Behavioral task
behavioral1
Sample
1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exe
Resource
win10v20210408
General
-
Target
1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exe
-
Size
386KB
-
MD5
2322804b8d184e80d018766484fe325a
-
SHA1
737e5cfc3472026d0d37edc07c66e3e35290fa22
-
SHA256
1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5
-
SHA512
95071c1968f855665d89f419d47e3931393d3deebe66212cee6f2f9cbb9cd73b6e190246af5f4296779347497e8544b63cf48be52e8cab03d57e1ab3f883a6d8
Malware Config
Extracted
redline
SewPalpadin
185.215.113.114:8887
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3492-116-0x0000000002290000-0x00000000022AB000-memory.dmp family_redline behavioral1/memory/3492-118-0x0000000004AF0000-0x0000000004B09000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exepid process 3492 1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exedescription pid process Token: SeDebugPrivilege 3492 1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exe"C:\Users\Admin\AppData\Local\Temp\1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492