Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
2cca70300e75df503f6676803b470383.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2cca70300e75df503f6676803b470383.exe
Resource
win10-en-20211208
General
-
Target
2cca70300e75df503f6676803b470383.exe
-
Size
444KB
-
MD5
2cca70300e75df503f6676803b470383
-
SHA1
7de77087c0dd09612acb8aa97025c9aa495e64f3
-
SHA256
191cfad3f68bdedbad3b6840e8d93ba5bb2566717de801264684c679340df950
-
SHA512
a0def3aba2baaff74eb4e98e399ad053d81929a7d8a45c954cc0aacfe86c8b411cabcdc823f543859c059c53abe874ba13d3a5cb5ba56007eb619fa55c538126
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1528-55-0x0000000002000000-0x0000000002034000-memory.dmp family_redline behavioral1/memory/1528-61-0x0000000002040000-0x0000000002072000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2cca70300e75df503f6676803b470383.exedescription pid process Token: SeDebugPrivilege 1528 2cca70300e75df503f6676803b470383.exe