Analysis
-
max time kernel
81s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
17-01-2022 03:24
Static task
static1
General
-
Target
d27b2b8bc6f9e95d5ebec82083ec8952f33daf2b7ab4fc0ce9812e265fa0df83.exe
-
Size
387KB
-
MD5
45a80d4856ec35f2c0827e0800a92587
-
SHA1
e230b4a479cfa95df334ec3d02d07bac8c1157eb
-
SHA256
d27b2b8bc6f9e95d5ebec82083ec8952f33daf2b7ab4fc0ce9812e265fa0df83
-
SHA512
3a9a3731aa916258779e1d27638e63fde6f47500bd09b00c73cbda8fea4855ca0043f0b48bcd9527377541b3ded23140f4d2a33399ac8ba258326709d71e1522
Malware Config
Extracted
Family
redline
Botnet
noname
C2
185.215.113.29:34865
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2340-118-0x0000000002410000-0x0000000002444000-memory.dmp family_redline behavioral1/memory/2340-120-0x0000000002770000-0x00000000027A2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d27b2b8bc6f9e95d5ebec82083ec8952f33daf2b7ab4fc0ce9812e265fa0df83.exedescription pid process Token: SeDebugPrivilege 2340 d27b2b8bc6f9e95d5ebec82083ec8952f33daf2b7ab4fc0ce9812e265fa0df83.exe