Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 19:30
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.5906.5645.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.TrojanX-gen.5906.5645.exe
-
Size
335KB
-
MD5
591dd75a6049a3ae71de34494e48cd4e
-
SHA1
acde50f20902dc065a2100db29c31fb9c6dacb65
-
SHA256
1a9a354ac3db19bd7612c5f9edf667f5586c7cae211ec5a1ac75c30641a30578
-
SHA512
23124d4b4219887906bc3b8e3676353b5dc9a418a567c506973d4cdf30d7a80e6094bf96ca6ba5d3a8934ddfc32928c249527eea3c2074b5a5418578f49fc8d3
-
SSDEEP
6144:IbwoOoLfaeT7UvLLW3IoLccO+o6sxiEGDd22t2gc1XnBrJRLQn:IbvPDaeT7US3PFOD/xiFd2ZRnBN
Malware Config
Extracted
redline
fredy
62.204.41.170:4132
-
auth_value
880249eef9593d49a1a3cddf57c5cb35
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1904-54-0x0000000004490000-0x00000000044D6000-memory.dmp family_redline behavioral1/memory/1904-55-0x0000000004970000-0x00000000049B4000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.TrojanX-gen.5906.5645.exepid process 1904 SecuriteInfo.com.Win32.TrojanX-gen.5906.5645.exe 1904 SecuriteInfo.com.Win32.TrojanX-gen.5906.5645.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Win32.TrojanX-gen.5906.5645.exedescription pid process Token: SeDebugPrivilege 1904 SecuriteInfo.com.Win32.TrojanX-gen.5906.5645.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-54-0x0000000004490000-0x00000000044D6000-memory.dmpFilesize
280KB
-
memory/1904-55-0x0000000004970000-0x00000000049B4000-memory.dmpFilesize
272KB
-
memory/1904-56-0x0000000002C8B000-0x0000000002CBA000-memory.dmpFilesize
188KB
-
memory/1904-57-0x00000000002E0000-0x000000000032B000-memory.dmpFilesize
300KB
-
memory/1904-58-0x0000000000400000-0x0000000002BBD000-memory.dmpFilesize
39.7MB
-
memory/1904-59-0x0000000075351000-0x0000000075353000-memory.dmpFilesize
8KB
-
memory/1904-60-0x0000000002C8B000-0x0000000002CBA000-memory.dmpFilesize
188KB
-
memory/1904-61-0x0000000000400000-0x0000000002BBD000-memory.dmpFilesize
39.7MB