Analysis
-
max time kernel
54s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 20:21
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
137KB
-
MD5
f9fd1c41152be65372a95aa482c0ee9d
-
SHA1
0b3290edd05e7bd6d1d4ec30226533fb54d0c62d
-
SHA256
47ef63815e62c44ab52f5034c2dac4ee6dbb043c5745c88197e666fa1cee9084
-
SHA512
6fd2844ff80ac65554497f6315502aa522544782f1f8f0c5c718ce3b7a90758f2a1a250eba7a65ea2aafa0b604381822ce1fe6d4a879193a601b178bd32b4030
-
SSDEEP
3072:fYO/ZMTFxF+wI4T1p+ac9JEy+noWFVyRP5hNSS0T:fYMZMBxFzIOkaC+oHp5h
Malware Config
Extracted
redline
myfile
18.220.118.211:37733
-
auth_value
90b715db3f4c0e3cf3d43bcda516644f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1504-54-0x0000000001320000-0x0000000001348000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 tmp.exe 1504 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1504 tmp.exe