Analysis
-
max time kernel
80s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe
Resource
win10v2004-20230220-en
General
-
Target
160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe
-
Size
358KB
-
MD5
afcd41851326685f7780c56300cfe249
-
SHA1
f4279dedea48a033d042a9dec7440e1f725dc86b
-
SHA256
160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18
-
SHA512
05d62d44a6b892334da7e15a3b16da5b2aff461a8221d8ace2626cc57fc11ed0c037e167ba35b6821e2939240d498f6e8ea7db0004570b501b4316b25ed072dd
-
SSDEEP
6144:5oLvd+sEQpohx4ckgHC+fgv2L34VJPw7EF9t57I+iQB7iiSHMNb:5o7d+sEQpohhHC+fc2TX7QI+iQB7Ty
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1752-139-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-140-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-142-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-144-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-146-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-148-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-150-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-152-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-154-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-160-0x00000000027C0000-0x00000000027D0000-memory.dmp family_redline behavioral1/memory/1752-161-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-157-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-163-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-165-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-167-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-169-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-171-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-175-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-173-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-177-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-179-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-181-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-185-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-183-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-189-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-187-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-191-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-193-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-195-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-199-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-197-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-201-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-205-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline behavioral1/memory/1752-203-0x00000000051D0000-0x0000000005222000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1600 1752 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe 1752 160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe"C:\Users\Admin\AppData\Local\Temp\160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 12202⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1752 -ip 17521⤵PID:1556