Analysis
-
max time kernel
113s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2023 20:24
Static task
static1
Behavioral task
behavioral1
Sample
a384fbf32223b82859993f7296459b3a71eb3ac29c083c1e42bf09d11cdd32cd.exe
Resource
win10v2004-20230220-en
General
-
Target
a384fbf32223b82859993f7296459b3a71eb3ac29c083c1e42bf09d11cdd32cd.exe
-
Size
288KB
-
MD5
2596e7b6b21218d1b45b3ff8d966493f
-
SHA1
25b894d8333597666fff1d6ce6131cf13b17c14e
-
SHA256
a384fbf32223b82859993f7296459b3a71eb3ac29c083c1e42bf09d11cdd32cd
-
SHA512
d7c717ebc7352198ace2fb8afabc203aa3809f66bda9271934ec617f71c736d89528b72c7c9dd0a5162c88425cea0125276fba5f413bf91fa48382de54fcb1d8
-
SSDEEP
6144:BGXGmU6CPxtTrPXU2WdIvsGm2te+kaXGCAiM28vE:BqQ6AxBjFmoJmJNaXxAiM9E
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/5040-137-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-138-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-140-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-142-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-144-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-146-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-148-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-150-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-152-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-155-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-158-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-160-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-162-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-164-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-166-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-168-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-170-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-172-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-174-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-176-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-178-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-180-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-182-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-184-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-186-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-188-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-190-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-192-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-194-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-196-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-198-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-202-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline behavioral1/memory/5040-200-0x0000000002990000-0x00000000029E2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2080 5040 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5040 a384fbf32223b82859993f7296459b3a71eb3ac29c083c1e42bf09d11cdd32cd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5040 a384fbf32223b82859993f7296459b3a71eb3ac29c083c1e42bf09d11cdd32cd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a384fbf32223b82859993f7296459b3a71eb3ac29c083c1e42bf09d11cdd32cd.exe"C:\Users\Admin\AppData\Local\Temp\a384fbf32223b82859993f7296459b3a71eb3ac29c083c1e42bf09d11cdd32cd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 12482⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5040 -ip 50401⤵PID:732