Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
24-10-2021 06:46
Static task
static1
Behavioral task
behavioral1
Sample
a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6c.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6c.exe
Resource
win10-en-20211014
General
-
Target
a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6c.exe
-
Size
715KB
-
MD5
3c0b19faee31188388d29d5e467437ea
-
SHA1
1b9fb053ccfdb4a06ee05c5992d9541f344cc157
-
SHA256
a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6cdd22ad053bc00dfa016
-
SHA512
cf1b0c6bd312b468fdcd51f3b2821d9986a104777fc0c7b7497e50d599dccfe5bf0748a6108085c7bf7c71b9b19f0362f928d220d8e4611af025efaf5c5ad7bf
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-60-0x0000000000A50000-0x0000000000A6A000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6c.exepid process 1720 a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6c.exedescription pid process Token: SeDebugPrivilege 1720 a91bc84dd26784dc82b1ee55b50dc3016738a09fa0f6c.exe