Analysis
-
max time kernel
82s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
91be0ef6635c6d2430f006acbc090d03338d2eafe921c1cf72fbc8c077cb885b.exe
Resource
win10-en-20211208
General
-
Target
91be0ef6635c6d2430f006acbc090d03338d2eafe921c1cf72fbc8c077cb885b.exe
-
Size
444KB
-
MD5
26a134a9ae3f32dfb36e1487adeabc15
-
SHA1
f27ea7f689132c3bb34a1f41b644d93181d0561a
-
SHA256
91be0ef6635c6d2430f006acbc090d03338d2eafe921c1cf72fbc8c077cb885b
-
SHA512
e7419a3b4e4708e6af558c094da2814766c329c2f7d0b9cb1bbf03cba53340088cbc9e81b205798d1576fa9c97e6f72ecf5b94c02b12f7905c81b34094fc43a1
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2564-116-0x00000000024B0000-0x00000000024E4000-memory.dmp family_redline behavioral1/memory/2564-119-0x00000000026F0000-0x0000000002722000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
91be0ef6635c6d2430f006acbc090d03338d2eafe921c1cf72fbc8c077cb885b.exedescription pid process Token: SeDebugPrivilege 2564 91be0ef6635c6d2430f006acbc090d03338d2eafe921c1cf72fbc8c077cb885b.exe