Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/11/2022, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
441KB
-
MD5
f816db892285955f716e274668888009
-
SHA1
811d1179329d94b9710f61728ef1d591e8d509a7
-
SHA256
41ba630d872de2e11573fc56d0d35f660af4400916cf45339d9bfbd6ac61ac1d
-
SHA512
396fffece646e240dc242e02d7472317f4fdcea214b5313f0289afdcf04718bd462395e7642fb00bdfcd7edd7315d1c065ce3e1977f823122339e7e6fc31f9d1
-
SSDEEP
6144:u48ricn5QHQPyttFisqYfFj9zGvGHKQrI9XkJlsldqt5EykTU7ITsq:d8jn5QjFirY9paO/r9vuqt5cI7
Malware Config
Extracted
redline
mix
193.106.191.25:47242
-
auth_value
5469d87831a100553f2f10d3aadec8bb
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1492 file.exe 1492 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1492 file.exe