Analysis
-
max time kernel
110s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
01-12-2021 21:00
Static task
static1
General
-
Target
379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe
-
Size
442KB
-
MD5
dbc8c65968ed3823a9716478dbd9d49a
-
SHA1
0a63ad61469fa208cef9d6b1d8c3f9de5ad0a899
-
SHA256
379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe
-
SHA512
c44f457f6668bded436acad1b94dfab2bafcceb978aacb1f814e06eb65374a3b5f052a7c05182aa898e4fc12fa8c1743d8229c646e49689e8e2fe39b9e83f412
Malware Config
Extracted
Family
redline
Botnet
1
C2
45.9.20.59:46287
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral1/memory/2536-120-0x00000000025D0000-0x00000000025FE000-memory.dmp family_redline behavioral1/memory/2536-124-0x0000000002640000-0x000000000266C000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2536 379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe"C:\Users\Admin\AppData\Local\Temp\379b9ed30dee34d61d678e5f24ffcca1b8e94fdf3f49a15d95947ba6dfba2dfe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536