Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-03-2022 16:22
Behavioral task
behavioral1
Sample
042056ffd522fe97e44829ba8bae5f9b182042267069d80d6ca6884e89695cb1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
042056ffd522fe97e44829ba8bae5f9b182042267069d80d6ca6884e89695cb1.exe
Resource
win10v2004-en-20220113
General
-
Target
042056ffd522fe97e44829ba8bae5f9b182042267069d80d6ca6884e89695cb1.exe
-
Size
126KB
-
MD5
b0b26931d589ced06db1f468b731c547
-
SHA1
a0653f11e7a4d861397184675b0ed2dd5dfc9cc3
-
SHA256
042056ffd522fe97e44829ba8bae5f9b182042267069d80d6ca6884e89695cb1
-
SHA512
228c03d30e5db67b83824a0b0d12785415bb8e120a9225437b5f0a61cacf42f296dd0434c5b025d1d74e460a22a2f7c7d1a67d6cc8cc257bbc4c249ae59470c0
Malware Config
Extracted
redline
10
80.66.87.14:35200
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1676-55-0x0000000001370000-0x0000000001396000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
042056ffd522fe97e44829ba8bae5f9b182042267069d80d6ca6884e89695cb1.exedescription pid process Token: SeDebugPrivilege 1676 042056ffd522fe97e44829ba8bae5f9b182042267069d80d6ca6884e89695cb1.exe