Analysis
-
max time kernel
51s -
max time network
60s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
17-06-2022 22:31
Static task
static1
General
-
Target
bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exe
-
Size
305KB
-
MD5
af5ad1b7a6203bec529846f40d25777d
-
SHA1
ac37f742458d9ed5337c3d4eddcfb7c32d83c853
-
SHA256
bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5
-
SHA512
77428f7742501653210a832a978cab5ffb4ac8852c6f798c810909f85fb7344ff5a56b2c67840ef7ba6103389027485f800aa475e1926a04fc45389af729a908
Malware Config
Extracted
Family
redline
Botnet
META
C2
193.106.191.245:23196
Attributes
-
auth_value
2ea67e19fe494687c77a179004b4a1c8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exepid process 3768 bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exe 3768 bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exedescription pid process Token: SeDebugPrivilege 3768 bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exe"C:\Users\Admin\AppData\Local\Temp\bc08a66b7ffb858c35346ba6bb18b102827081e8032e884abdecedc0fd0d38f5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768