Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 23:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
373KB
-
MD5
c351500d1e26876f84ac2df4f7cf6577
-
SHA1
d33b50a5c77d4a0992a7b8f73e623e15a114ea3f
-
SHA256
4aa9220963ecf6f912f6ba434a4086817af295fedfb975862e0bd8b967b38dff
-
SHA512
392fd668118d6196e80a3d55e3af86563b4a0f63bb0198389d46f10f7c197456bc6448ba4534382fb8f293375a145a24a9123ffec3cf4888dc35e2503a188059
-
SSDEEP
6144:7qOL9Pky9a80vcTDBv2ZDHFoJQ5VkiLVxQDyYUFvFxGb:7T5cy9a4h2dHF0QTkZ+YsA
Malware Config
Extracted
redline
neruz
193.106.191.27:47242
-
auth_value
0169a8759f3c9be473f782b96a6ff704
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
file.exepid process 1480 file.exe 1480 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 1480 file.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1480-54-0x0000000002450000-0x000000000249C000-memory.dmpFilesize
304KB
-
memory/1480-55-0x0000000002510000-0x000000000255A000-memory.dmpFilesize
296KB
-
memory/1480-57-0x0000000000220000-0x0000000000279000-memory.dmpFilesize
356KB
-
memory/1480-56-0x000000000099A000-0x00000000009D0000-memory.dmpFilesize
216KB
-
memory/1480-58-0x0000000000400000-0x0000000000860000-memory.dmpFilesize
4.4MB
-
memory/1480-59-0x0000000076201000-0x0000000076203000-memory.dmpFilesize
8KB
-
memory/1480-60-0x000000000099A000-0x00000000009D0000-memory.dmpFilesize
216KB
-
memory/1480-61-0x0000000000400000-0x0000000000860000-memory.dmpFilesize
4.4MB