Analysis
-
max time kernel
51s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
27/12/2022, 22:55
Static task
static1
General
-
Target
b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3.exe
-
Size
403KB
-
MD5
11dedfaf9988d4db6bddc8a4461a25e1
-
SHA1
ddcac7ef802b30c60d49893e0a02a93fc1ae2723
-
SHA256
b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3
-
SHA512
ac5f0f07d08f5c4b880313eb539bc21c6d2996ec8aede12c925fd032ed4cfbb21fa804940d56955cec9b8e709a9c64fa2e4b2eb489c907a457aa0d01e7c27fa2
-
SSDEEP
6144:I5LeaJxuJZCd5X5HZPGUEi0y4ZrdS9UZdLaYon5Jk4eROw:4S2uJwd5ppF9MZrXdin5JF
Malware Config
Extracted
redline
portu
31.41.244.198:4083
-
auth_value
2bb4259a41338919fb81efc2c9944e97
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4544-164-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/4544-171-0x0000000002530000-0x0000000002574000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3.exe 4544 b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4544 b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3.exe"C:\Users\Admin\AppData\Local\Temp\b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544