Analysis
-
max time kernel
60s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2023 17:16
Behavioral task
behavioral1
Sample
659153215ff16dd246c03924bb1a022e.exe
Resource
win7-20220812-en
General
-
Target
659153215ff16dd246c03924bb1a022e.exe
-
Size
200KB
-
MD5
659153215ff16dd246c03924bb1a022e
-
SHA1
ad1e2f480e149092591cc3b3f67febf29fc950ae
-
SHA256
766343270dcedaae51b835c7c06f6520e28684513a6ba3b8cc516f557a73ad1b
-
SHA512
9f6e8c51292e76f728b67e07407b5667ba9410f5fe01858e69adb74396fbff8be55f36a666d83634d7a4685b1f1c9ec2cabfbc6dfdf42d2d61b630e0577f80f9
-
SSDEEP
1536:DYadaBIcw5rGprGv+FN/IeecbXEeDge3Xpzur1t8adOUw1y/pbYY3GF:Xxcfwv8WU0MBne8krhpPGF
Malware Config
Extracted
redline
NewMeta
62.204.41.175:44271
-
auth_value
17fa7f7be50211e297419e2543a28105
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4684 659153215ff16dd246c03924bb1a022e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4684 659153215ff16dd246c03924bb1a022e.exe