Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
02/02/2023, 15:51
General
-
Target
3a9211b22f16d7109b59a3f2a013b081ee9ded4f92fb0326df4c8608cb0563c4.exe
-
Size
175KB
-
MD5
d433d033355b488118e8c06274d3cfce
-
SHA1
c5f5c54a2e99d9a2862d7d6334b6176aea70b45b
-
SHA256
3a9211b22f16d7109b59a3f2a013b081ee9ded4f92fb0326df4c8608cb0563c4
-
SHA512
bddf4ff7d0104981292c5dbb5e29d8d797f02effb90057f74da55213b424c73e9d1865ebdd6c65d315aa4af7180c197690dd8fcdce1163a061cacc6996df7b80
-
SSDEEP
3072:pxqZWn7aNQYF8YLFcI4Meqs9rhvPxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOL:bqZuYLFcrXrh
Malware Config
Extracted
redline
mixo
176.113.115.16:4122
-
auth_value
f8c6749529d254a59e80682dd4ba63f6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4940 3a9211b22f16d7109b59a3f2a013b081ee9ded4f92fb0326df4c8608cb0563c4.exe 4940 3a9211b22f16d7109b59a3f2a013b081ee9ded4f92fb0326df4c8608cb0563c4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4940 3a9211b22f16d7109b59a3f2a013b081ee9ded4f92fb0326df4c8608cb0563c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a9211b22f16d7109b59a3f2a013b081ee9ded4f92fb0326df4c8608cb0563c4.exe"C:\Users\Admin\AppData\Local\Temp\3a9211b22f16d7109b59a3f2a013b081ee9ded4f92fb0326df4c8608cb0563c4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940