Analysis
-
max time kernel
50s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30-12-2022 07:55
Static task
static1
General
-
Target
58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9.exe
-
Size
353KB
-
MD5
5d302dc5573f121ac70afea0dadae736
-
SHA1
81975cbb77e48d8c2038ddc307aaf9fa040d3006
-
SHA256
58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9
-
SHA512
5abbb6e790e1d18b86fba4f042564fdaca5222273ee08794925648153c7c28d25254fff551079ea48c9bd48d987dc65dffc13efc38b3f9cd35a504294f6d4e12
-
SSDEEP
6144:oL9RwhCDta8Pzy4+r+WLjGJiP7GkAQDzcTw9MBo5oIyx3E5:oBRzDs8byjZqizSQDzv6ck
Malware Config
Extracted
redline
sport
31.41.244.98:4063
-
auth_value
82cce55eeb56b322651e98032c09d225
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2660-164-0x0000000002790000-0x00000000027D6000-memory.dmp family_redline behavioral1/memory/2660-171-0x0000000004B90000-0x0000000004BD4000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9.exe 2660 58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9.exe"C:\Users\Admin\AppData\Local\Temp\58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660