Analysis
-
max time kernel
25s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 14:35
Static task
static1
Behavioral task
behavioral1
Sample
ac08d04e9fafc4bf8d4ae8880dfc6736.exe
Resource
win7-20221111-en
General
-
Target
ac08d04e9fafc4bf8d4ae8880dfc6736.exe
-
Size
335KB
-
MD5
ac08d04e9fafc4bf8d4ae8880dfc6736
-
SHA1
48d5ea799400caebc1f2c572dec2813fd9e46893
-
SHA256
58f3394fd637f0849ee49b99dd66b868c12d8386f47fd39821a0029f4b0fe5d2
-
SHA512
1c9ccc64e43dc9148750a7ebb55f57638c18bd1a49d7e9f372a26827aa7de8191ea35b93b576a237e8bbde761880b47a6e7024cda437815a4805d526cc37cdfa
-
SSDEEP
6144:mWgsCh9LiV+7+d4ZRewkF6CB4c0QjVzP05/cdxpx1mM8a8YH2PqXaUx7FN2:mWXU9WV+7+2eNF6CKcpjVzP05/Chlv8G
Malware Config
Extracted
redline
fredy
62.204.41.170:4132
-
auth_value
880249eef9593d49a1a3cddf57c5cb35
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1792-54-0x00000000046A0000-0x00000000046E6000-memory.dmp family_redline behavioral1/memory/1792-57-0x0000000004810000-0x0000000004854000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ac08d04e9fafc4bf8d4ae8880dfc6736.exepid process 1792 ac08d04e9fafc4bf8d4ae8880dfc6736.exe 1792 ac08d04e9fafc4bf8d4ae8880dfc6736.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ac08d04e9fafc4bf8d4ae8880dfc6736.exedescription pid process Token: SeDebugPrivilege 1792 ac08d04e9fafc4bf8d4ae8880dfc6736.exe