Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28/12/2022, 01:00
Static task
static1
General
-
Target
9cfd4fc2b533f3911f6ec8b394ce0b65aae140f262299d2bb91e7e23c1b459bb.exe
-
Size
402KB
-
MD5
49227c55825052044da5757a6f0c0df1
-
SHA1
cfb9476e1903fccabf4bd4f8dc457ea4baa040f3
-
SHA256
9cfd4fc2b533f3911f6ec8b394ce0b65aae140f262299d2bb91e7e23c1b459bb
-
SHA512
620d27f43ec396830420ff1f0735966ca751b4257c91522780e2bab60d42f85d6ac4a10653ce5b04fdfd0f3a2b7af9f96caffa09bc0894fb8c15383c307ef259
-
SSDEEP
6144:JolLXZl7NM9q5kE5/vdE2//XpvYI9a9Vyu9UZdLaYon5Jk4eROXNj:yL+c5ks/vR/xv6c5din5JFR
Malware Config
Extracted
redline
@2023@New
91.215.85.155:32796
-
auth_value
0be5b9b84cd5b707e91a48e341e3f7d7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2456-159-0x0000000002420000-0x0000000002466000-memory.dmp family_redline behavioral1/memory/2456-166-0x00000000025C0000-0x0000000002604000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2456 9cfd4fc2b533f3911f6ec8b394ce0b65aae140f262299d2bb91e7e23c1b459bb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 9cfd4fc2b533f3911f6ec8b394ce0b65aae140f262299d2bb91e7e23c1b459bb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cfd4fc2b533f3911f6ec8b394ce0b65aae140f262299d2bb91e7e23c1b459bb.exe"C:\Users\Admin\AppData\Local\Temp\9cfd4fc2b533f3911f6ec8b394ce0b65aae140f262299d2bb91e7e23c1b459bb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456