Analysis
-
max time kernel
56s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07/03/2023, 18:51
Static task
static1
General
-
Target
9cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2.exe
-
Size
365KB
-
MD5
69fb73e283630210dcb0e9b400a1ee4c
-
SHA1
f746b5f15ebf476579d0705720ab4daec3306e41
-
SHA256
9cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2
-
SHA512
ee9062a2b4a2ece85c000e369dd1bc1815ce159c87235cba0e36e7a26f7548c28d4c6dfe9a10b22addbe7b1f8c2cd9972446925a5e57fa0644d9c617cda1784f
-
SSDEEP
6144:YY0L64nRBgQZ50kxyZCQj4pPIuVBNX++ZbE8GqcdPQrixxAAY4eZu:YY0O4RBgQwsyZj4pPlxu+ZQ8id4rixxH
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4192-124-0x0000000002670000-0x00000000026B6000-memory.dmp family_redline behavioral1/memory/4192-126-0x00000000026F0000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/4192-127-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-128-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-130-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-132-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-134-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-136-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-138-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-140-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-142-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-144-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-146-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-148-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-150-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-152-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-164-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-166-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-162-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-172-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-174-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-180-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-178-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-176-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-182-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-186-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-188-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-184-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-190-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-170-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-168-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-160-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-158-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-156-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/4192-154-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4192 9cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2.exe 4192 9cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4192 9cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2.exe"C:\Users\Admin\AppData\Local\Temp\9cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192