Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-05-2022 14:37
Static task
static1
Behavioral task
behavioral1
Sample
8a54239a1198381d7ee58ec079daa9bf.exe
Resource
win7-20220414-en
General
-
Target
8a54239a1198381d7ee58ec079daa9bf.exe
-
Size
347KB
-
MD5
8a54239a1198381d7ee58ec079daa9bf
-
SHA1
2186416a26161220603ab0f6f04e7905b9e49af1
-
SHA256
23d8c293f8e11955f68c28f40c795e59ab7e7d0c5b5e5c19aed8309c2596e5a9
-
SHA512
f9cbaaba73858b9be37e631ab156cd573e0ea414c121546ca5788d9086af32964a137c4844fd64ace5939b319586e084086b9a361d69cfbe431fd980a15cc493
Malware Config
Extracted
redline
top
iclarinyerac.xyz:80
manellylarii.xyz:80
-
auth_value
b66a08c69f913be894bbfce00805fab1
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8a54239a1198381d7ee58ec079daa9bf.exepid process 1596 8a54239a1198381d7ee58ec079daa9bf.exe 1596 8a54239a1198381d7ee58ec079daa9bf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8a54239a1198381d7ee58ec079daa9bf.exedescription pid process Token: SeDebugPrivilege 1596 8a54239a1198381d7ee58ec079daa9bf.exe