Analysis
-
max time kernel
110s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
04-12-2021 17:51
Static task
static1
General
-
Target
0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe
-
Size
1.7MB
-
MD5
d26d44e3fcafbda2412ab16ad267d7e0
-
SHA1
ab1e7a00000bb5fd37c1c812ba68e9a661912f1b
-
SHA256
0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504
-
SHA512
6f98b8eb5b1e708b7a4623cfb54c8243f4d8c941d2c66a838395e7bde8ee082e0458649128ee0b4e7cdb0eb3b03e5868b6b6579dbb370b43aaaa5bd6bda27b80
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/memory/2600-166-0x0000000000400000-0x00000000007FA000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2600 0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2600 0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe"C:\Users\Admin\AppData\Local\Temp\0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600