Analysis
-
max time kernel
14s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-08-2021 02:50
Static task
static1
Behavioral task
behavioral1
Sample
7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exe
Resource
win10v20210410
General
-
Target
7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exe
-
Size
307KB
-
MD5
0a7d739d28b5c574cbbd63d9f5a1d74a
-
SHA1
6a412871b87383fb43c6e781228f6a5a83d29dc5
-
SHA256
7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd
-
SHA512
81677276f0712cc7ae564804eadabb18028e59521ada30b1291a122f7e6e17a3989ae4f7cca0ed22abba0b8a02daaaa55daf4286a4cd5d5c925166128eabf6d6
Malware Config
Extracted
redline
SewPalpadin
185.215.113.114:8887
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2388-115-0x0000000004B10000-0x0000000004B2B000-memory.dmp family_redline behavioral1/memory/2388-117-0x00000000072F0000-0x0000000007309000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exepid process 2388 7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exedescription pid process Token: SeDebugPrivilege 2388 7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exe"C:\Users\Admin\AppData\Local\Temp\7e1e85f45b5af0c11a6f55bbbc8b4f7062a82df441b85563b6d6c4c47c3988cd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388