Analysis
-
max time kernel
57s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08/03/2023, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55.exe
Resource
win10-20230220-en
General
-
Target
bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55.exe
-
Size
297KB
-
MD5
a77ce6427ff04bb79fbcdec644411afa
-
SHA1
cb8f36f0ad4544d4e4f4471bf96b04972d3b1715
-
SHA256
bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55
-
SHA512
37b4524f6675de7d2f3d88097c2719ed8c9cd916c8fcb0fed6266da63e7ba775bff21158bd4b6b00298819da0f521636567af6ad2b9c2f7bda416f8920695151
-
SSDEEP
6144:67XjmQ4EbqEmKX8hc+n+9G5YgUQt1OE6YHFAq9CbvI9K:6zl4EbqEFONn+s2gRt1qYyqwbg9
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/2788-121-0x0000000002340000-0x000000000239A000-memory.dmp family_redline behavioral1/memory/2788-126-0x0000000002650000-0x00000000026A8000-memory.dmp family_redline behavioral1/memory/2788-128-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-129-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-131-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-133-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-135-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-137-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-139-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-141-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-143-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-145-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-147-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-151-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-149-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-153-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-155-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-157-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-161-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-163-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-159-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-165-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-169-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-167-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-171-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-175-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-173-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-179-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-181-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-177-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-183-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-185-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-187-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline behavioral1/memory/2788-189-0x0000000002650000-0x00000000026A2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2788 bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55.exe 2788 bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55.exe"C:\Users\Admin\AppData\Local\Temp\bbcd99f07d17b33a6dc6a14153229137b0d4fa2cb17ed725774e11c911599a55.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788