Analysis
-
max time kernel
82s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
16-01-2022 08:52
Static task
static1
General
-
Target
098aebdc9da198cf674af66fec9a7d790feebf60e78ec7c6288851d8b3db30f5.exe
-
Size
416KB
-
MD5
5c07760d4ef93292c5b19dd55ebbc322
-
SHA1
c3368e114c04ffc907dd982e3d0aa11cbb5bca34
-
SHA256
098aebdc9da198cf674af66fec9a7d790feebf60e78ec7c6288851d8b3db30f5
-
SHA512
d617d776f4f2a84d4a4023308dff246a846ecf42a897fa2b606de7ea270d52d1d6df098adca778f334c8a27a8302648e72d6d84c6b1dab7d55cecd5a5b8d24d3
Malware Config
Extracted
Family
redline
Botnet
noname
C2
185.215.113.29:34865
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3720-116-0x00000000025A0000-0x00000000025D4000-memory.dmp family_redline behavioral1/memory/3720-118-0x0000000002730000-0x0000000002762000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
098aebdc9da198cf674af66fec9a7d790feebf60e78ec7c6288851d8b3db30f5.exedescription pid process Token: SeDebugPrivilege 3720 098aebdc9da198cf674af66fec9a7d790feebf60e78ec7c6288851d8b3db30f5.exe