Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16/12/2022, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
333KB
-
MD5
6d65f4dc0b710e0bb994f7a79c29526d
-
SHA1
259d2edea39cbe4edf1d1cf0b967343c46a0fa67
-
SHA256
fd61726ec48ddfbe4a0c7fd1b36a84ef3e1e9d2c723cc77010eed2f287d50d0d
-
SHA512
cbfaaffb508cc5af722feb2014efe79e92fbd7517e9df043e58c4dfc80a9026deede3ab21f6b1d72c56e424f512311a1a0c4af61325a3e086609a2ad9496934c
-
SSDEEP
6144:3BE/LWTLQ5IvRvLF6Uogm3UAJXTNfe7cgHyW6pgz5rB4fU40M2b:3BWg0w9Ajp9Yv4f
Malware Config
Extracted
redline
Joker
31.41.244.186:4083
-
auth_value
e732e83bc1688118a361a2a4ba4b2d46
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1388-58-0x0000000001EE0000-0x0000000001F26000-memory.dmp family_redline behavioral1/memory/1388-59-0x0000000001F20000-0x0000000001F64000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1388 file.exe 1388 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1388 file.exe