Analysis
-
max time kernel
61s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 08:46
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
175KB
-
MD5
acf54cfad4852b63202ba4b97effdd9e
-
SHA1
cc7456e4b78957fc2d013cec39b30ea7ed8dbaa2
-
SHA256
f4bfa9f592a953ba496c92d14b1ef1698ada62b9cb547e6a0843ced061fb6e8e
-
SHA512
d9f3d31b55b60f9f09dd7fe26f0f40db21db9b3253fef1c416ced30bab396d161e89375096032311f6c4199fabd156f75670fd6598789868bd8cf1e9f463699b
-
SSDEEP
3072:0xqZWTHaJIppU4LFca4devt9ThVTxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOi:KqZH4LFcxUTh
Malware Config
Extracted
redline
temposs6678
82.115.223.9:15486
-
auth_value
af399e6a2fe66f67025541cf71c64313
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 tmp.exe 4912 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4912 tmp.exe