Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/12/2022, 08:45
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
175KB
-
MD5
1958abaf26a2481db680eb816bc479d7
-
SHA1
027be9c7aa87cdc18e14ac094437d1a80f5438d9
-
SHA256
897ae211065da754a01d4c523b81eee16c233d16b6d4cbd905555325343136bf
-
SHA512
b009b2ad6422a8204743879f6dc884bfa5bdeb27e90a63c86d19f2541b612e1a958d35f8960b6e46004188f7373bf5df51fb17a33609969b79619ec65a9b918c
-
SSDEEP
3072:TxqZWFFa7E6T8MkEWGlj9eOYFbhy3xNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0j2:lqZcMkEWY6bh
Malware Config
Extracted
redline
all2
168.119.175.86:6218
-
auth_value
fff03f098d6815c6befdf2b6e93cf200
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1212 file.exe 1212 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1212 file.exe