Analysis
-
max time kernel
83s -
max time network
85s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23/09/2022, 17:03
Static task
static1
General
-
Target
53307de2ad77233e82687f446422deee438582d87d190921e7a5c8d8d949f0ac.exe
-
Size
317KB
-
MD5
ac856ed191ceacb11e73472c9c0b7c86
-
SHA1
dea2470ad62cdce534d89337347af611ef2cfdd7
-
SHA256
53307de2ad77233e82687f446422deee438582d87d190921e7a5c8d8d949f0ac
-
SHA512
ec70513f59dc4f6b2e97d13bac3a0d7d2d3e305158811cf4bad626fd3b99dc938e6f85d15965509cafc4f1aa1397e198eb2dd40e2959e963d158ce152b2c03f4
-
SSDEEP
6144:pLyDi8ZnsV2Wc9SxdkUSmU99ZcqP7vZj5DtSNG0ly7daqU6e:pgi8huccD83VbZtDtyGds/
Malware Config
Extracted
redline
32489234
78.153.144.6:2510
-
auth_value
ad7ebeff731e5655a1b7feb5e468ead2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2804-159-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/2804-166-0x0000000004C60000-0x0000000004C9C000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 53307de2ad77233e82687f446422deee438582d87d190921e7a5c8d8d949f0ac.exe 2804 53307de2ad77233e82687f446422deee438582d87d190921e7a5c8d8d949f0ac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 53307de2ad77233e82687f446422deee438582d87d190921e7a5c8d8d949f0ac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53307de2ad77233e82687f446422deee438582d87d190921e7a5c8d8d949f0ac.exe"C:\Users\Admin\AppData\Local\Temp\53307de2ad77233e82687f446422deee438582d87d190921e7a5c8d8d949f0ac.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804