Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
19-10-2021 20:11
Static task
static1
General
-
Target
83a3410458dc24f2be30b6f7be0f41008c07e5b9b8808f7157a86a3faadfbd95.exe
-
Size
338KB
-
MD5
195d2a61c26dcdbfae8be2384fd7eef4
-
SHA1
58b71fd3fc07e2725757fd4e642900f449466e14
-
SHA256
83a3410458dc24f2be30b6f7be0f41008c07e5b9b8808f7157a86a3faadfbd95
-
SHA512
93875065842e459c1e41eeba69ea38103789cda5cdcd01c429f7caef15650a12f45984de16e38699c8d1cfa460d1b39c948a5a7e434ee0291b7f51d93f95339d
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2352-117-0x0000000004DA0000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/2352-119-0x0000000004F60000-0x0000000004F7D000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
83a3410458dc24f2be30b6f7be0f41008c07e5b9b8808f7157a86a3faadfbd95.exedescription pid process Token: SeDebugPrivilege 2352 83a3410458dc24f2be30b6f7be0f41008c07e5b9b8808f7157a86a3faadfbd95.exe