Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-10-2021 17:22
Static task
static1
General
-
Target
24c034a82fde6df10be6dca2850e5ec6cd0113893974cf497b79885d117e9303.exe
-
Size
364KB
-
MD5
0c0cdf1349612e699ca21566e4149861
-
SHA1
5f67ea078e7888a9b1d321178a209820dc5a8ac2
-
SHA256
24c034a82fde6df10be6dca2850e5ec6cd0113893974cf497b79885d117e9303
-
SHA512
149adb8b421f0de5dab4d139b4a2044dd18a8fa4f83e18078238dcda8def4a98ace9432d058e6794382501b9f3ee5e0a4660b61a82f2a3fa0c50f4cb191c166b
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2680-118-0x0000000004E60000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2680-123-0x0000000007590000-0x00000000075AD000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
24c034a82fde6df10be6dca2850e5ec6cd0113893974cf497b79885d117e9303.exedescription pid process Token: SeDebugPrivilege 2680 24c034a82fde6df10be6dca2850e5ec6cd0113893974cf497b79885d117e9303.exe