Analysis
-
max time kernel
52s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02-01-2023 17:27
Static task
static1
General
-
Target
4ff36debcb16cce699a344441ea9f517d50afc59b8b022bdccca94b20d6a4f40.exe
-
Size
330KB
-
MD5
b54ce05e6493b2221263316bf0ce1106
-
SHA1
510cbc67ea119d18b17381c733e3120fed721e6e
-
SHA256
4ff36debcb16cce699a344441ea9f517d50afc59b8b022bdccca94b20d6a4f40
-
SHA512
f4c08a858d926f3c509add035f0d72494df51eef57939ed820282eda5f777cc806103f75d9d06ae9dcf1b791b6d7a473e17a6b946be1e20317c6effb75703626
-
SSDEEP
6144:MJCLRiAbgduk75BQCz9HPH7RreG0MBm2Wpd+o20:MJC9i/uk75BQCz9HP9rXBSpl20
Malware Config
Extracted
redline
sport
31.41.244.98:4063
-
auth_value
82cce55eeb56b322651e98032c09d225
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2576-158-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/2576-165-0x0000000004A40000-0x0000000004A84000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 4ff36debcb16cce699a344441ea9f517d50afc59b8b022bdccca94b20d6a4f40.exe 2576 4ff36debcb16cce699a344441ea9f517d50afc59b8b022bdccca94b20d6a4f40.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 4ff36debcb16cce699a344441ea9f517d50afc59b8b022bdccca94b20d6a4f40.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff36debcb16cce699a344441ea9f517d50afc59b8b022bdccca94b20d6a4f40.exe"C:\Users\Admin\AppData\Local\Temp\4ff36debcb16cce699a344441ea9f517d50afc59b8b022bdccca94b20d6a4f40.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576