Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/12/2022, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989.exe
Resource
win7-20221111-en
General
-
Target
3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989.exe
-
Size
402KB
-
MD5
c0bd1b7aff8a6f4adb3eff5002abb22e
-
SHA1
6aa5d4967994a5a21ea9bfa9c3730333a22de10e
-
SHA256
3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989
-
SHA512
2c033b88a05a9f7d9f29f9b2803c2f253e3d4ba96947b05d20682a18f0f8a50fd544fdba7a3cb2c121de665ef8c0a0c5baba540b665d4a3decf096c3b6ecbc73
-
SSDEEP
6144:malZLWzzu2j9GQbe0vZreEZ1vy1HYi+sqXfAsn9UZdLaYon5Jk4eROw1g:TlZ6Hp9GQq0vZqEPyShXYxdin5JF
Malware Config
Extracted
redline
portu
31.41.244.198:4083
-
auth_value
2bb4259a41338919fb81efc2c9944e97
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1340-54-0x0000000001FA0000-0x0000000001FE6000-memory.dmp family_redline behavioral1/memory/1340-55-0x0000000002250000-0x0000000002294000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1340 3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989.exe 1340 3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1340 3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989.exe"C:\Users\Admin\AppData\Local\Temp\3438fdcda2bbbe519d262f959d6e807f3fdace9240e0b1b15a1759be704f4989.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340