Analysis
-
max time kernel
4294196s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
08-03-2022 19:59
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PWS.Steam.26450.29302.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PWS.Steam.26450.29302.exe
Resource
win10v2004-en-20220112
General
-
Target
SecuriteInfo.com.Trojan.PWS.Steam.26450.29302.exe
-
Size
1.1MB
-
MD5
1cb79dd340381e83c85a178c8a921b36
-
SHA1
3e8be81d4217a38a325058666395dcb32b122474
-
SHA256
6087cbea917f0062401149be475a2d9440d00ce2a962d3be3b16f26264729233
-
SHA512
f0425436b7df637bb9b886ea6759c3b225f1368a10dbdc890b3fc6ee5b3e5472f0d7da56bcf037d709c5d1ccbfdf516a18bde975f3f9165e278c89b5ac3a3766
Malware Config
Extracted
redline
bild
95.216.21.217:19597
-
auth_value
6a86304a315cc6a978ccb33feb915de5
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1928-57-0x00000000013A0000-0x00000000014DA000-memory.dmp family_redline behavioral1/memory/1928-58-0x00000000013A0000-0x00000000014DA000-memory.dmp family_redline behavioral1/memory/1928-66-0x00000000013A0000-0x00000000014DA000-memory.dmp family_redline behavioral1/memory/1928-70-0x00000000013A0000-0x00000000014DA000-memory.dmp family_redline behavioral1/memory/1928-69-0x00000000013A0000-0x00000000014DA000-memory.dmp family_redline -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Steam.26450.29302.exepid process 1928 SecuriteInfo.com.Trojan.PWS.Steam.26450.29302.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Steam.26450.29302.exepid process 1928 SecuriteInfo.com.Trojan.PWS.Steam.26450.29302.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1928-54-0x00000000757C1000-0x00000000757C3000-memory.dmpFilesize
8KB
-
memory/1928-55-0x0000000074990000-0x00000000749DA000-memory.dmpFilesize
296KB
-
memory/1928-56-0x0000000000250000-0x0000000000296000-memory.dmpFilesize
280KB
-
memory/1928-57-0x00000000013A0000-0x00000000014DA000-memory.dmpFilesize
1.2MB
-
memory/1928-58-0x00000000013A0000-0x00000000014DA000-memory.dmpFilesize
1.2MB
-
memory/1928-59-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/1928-61-0x0000000075120000-0x00000000751CC000-memory.dmpFilesize
688KB
-
memory/1928-62-0x0000000075770000-0x00000000757B7000-memory.dmpFilesize
284KB
-
memory/1928-63-0x00000000751E0000-0x0000000075237000-memory.dmpFilesize
348KB
-
memory/1928-65-0x0000000076BC0000-0x0000000076D1C000-memory.dmpFilesize
1.4MB
-
memory/1928-66-0x00000000013A0000-0x00000000014DA000-memory.dmpFilesize
1.2MB
-
memory/1928-67-0x00000000764A0000-0x000000007652F000-memory.dmpFilesize
572KB
-
memory/1928-70-0x00000000013A0000-0x00000000014DA000-memory.dmpFilesize
1.2MB
-
memory/1928-71-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1928-69-0x00000000013A0000-0x00000000014DA000-memory.dmpFilesize
1.2MB
-
memory/1928-72-0x0000000075770000-0x00000000757B7000-memory.dmpFilesize
284KB
-
memory/1928-73-0x0000000073F60000-0x000000007464E000-memory.dmpFilesize
6.9MB
-
memory/1928-74-0x00000000757C0000-0x000000007640A000-memory.dmpFilesize
12.3MB
-
memory/1928-75-0x000000006CE40000-0x000000006CE57000-memory.dmpFilesize
92KB
-
memory/1928-76-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/1928-77-0x0000000076590000-0x00000000765C5000-memory.dmpFilesize
212KB