Analysis
-
max time kernel
83s -
max time network
85s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/02/2023, 17:14
Static task
static1
General
-
Target
6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938.exe
-
Size
287KB
-
MD5
5679820c359decb6148df7d1f99dbf24
-
SHA1
afc2c0c251e62bdcfa1b53ae4f228ba8d734ee9f
-
SHA256
6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938
-
SHA512
71d465a2e6accb08a50dc8545792df0c0dd2ea67c06be3462448ce4d76166c12214a8e8b99d994a7303d8b9b7c6f8974b01aa5af206f3f2eed4e59b503731aa9
-
SSDEEP
6144:AtLrW/o0QaE0UeUCXLfZEKaTovPOmCX0oAWv:AlqQx0HLeK8ovWmM0oAW
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2584-161-0x00000000028D0000-0x0000000002916000-memory.dmp family_redline behavioral1/memory/2584-168-0x00000000029A0000-0x00000000029E4000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2584 6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938.exe 2584 6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938.exe"C:\Users\Admin\AppData\Local\Temp\6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584