Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 18:48
Static task
static1
Behavioral task
behavioral1
Sample
68900761d23c77b005b89feb89876c85.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
68900761d23c77b005b89feb89876c85.exe
Resource
win10-en-20211208
General
-
Target
68900761d23c77b005b89feb89876c85.exe
-
Size
515KB
-
MD5
68900761d23c77b005b89feb89876c85
-
SHA1
2d9a95cfe66fd559424957eed4ac797271a87144
-
SHA256
782f3607d63d38bd59a78ae9f219ef092850f29c3da05c019594b44f53ac84ac
-
SHA512
1ff6772b27c34d5550ef6d11b69beb4ab99dd17ad1600286248cd3dd9dec3469bf5d39d80252a60965ddfb76a75f7d9d72b73f5460d2b8ffe9a8739d1b34c571
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/528-56-0x0000000000AE0000-0x0000000000BB9000-memory.dmp family_redline behavioral1/memory/528-64-0x0000000000AE0000-0x0000000000BB9000-memory.dmp family_redline behavioral1/memory/528-65-0x0000000000AE0000-0x0000000000BB9000-memory.dmp family_redline behavioral1/memory/528-68-0x0000000002660000-0x0000000002790000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
68900761d23c77b005b89feb89876c85.exepid process 528 68900761d23c77b005b89feb89876c85.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
68900761d23c77b005b89feb89876c85.exepid process 528 68900761d23c77b005b89feb89876c85.exe 528 68900761d23c77b005b89feb89876c85.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
68900761d23c77b005b89feb89876c85.exedescription pid process Token: SeDebugPrivilege 528 68900761d23c77b005b89feb89876c85.exe