Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09-03-2023 09:10
Static task
static1
Behavioral task
behavioral1
Sample
500b898ee7522bb8a39288e0b0e0bf1c206084c49cd6d78dfd21a8356fea91a9.exe
Resource
win10-20230220-en
General
-
Target
500b898ee7522bb8a39288e0b0e0bf1c206084c49cd6d78dfd21a8356fea91a9.exe
-
Size
378KB
-
MD5
1017abe2cf579889be7bf577efcbf4cf
-
SHA1
f4d348bb1f71facece2ceeed2fb88b4dcd12de4f
-
SHA256
500b898ee7522bb8a39288e0b0e0bf1c206084c49cd6d78dfd21a8356fea91a9
-
SHA512
915756738bb2fefa4afbb20c083b50607eec02de9ec8b7267f90d719fec7a0bbd5338f73b8bf5d4aef7669d5242efc783f65d482e1221486b76043e55ba30d15
-
SSDEEP
6144:gh4EBLDAfvtb7nqiDxnf8tA6TxG9imQdVEUF:gh7BfAfvtnhf8JdGLQf
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/404-123-0x0000000004B30000-0x0000000004B8A000-memory.dmp family_redline behavioral1/memory/404-125-0x0000000004BD0000-0x0000000004C28000-memory.dmp family_redline behavioral1/memory/404-129-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-130-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-132-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-134-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-136-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-138-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-140-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-142-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-144-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-146-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-148-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-150-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-152-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-154-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-156-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-158-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-162-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-160-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-164-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-166-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-168-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-170-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-172-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-174-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-176-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-178-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-180-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-182-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-184-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-186-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-188-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-190-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline behavioral1/memory/404-192-0x0000000004BD0000-0x0000000004C22000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 404 500b898ee7522bb8a39288e0b0e0bf1c206084c49cd6d78dfd21a8356fea91a9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 404 500b898ee7522bb8a39288e0b0e0bf1c206084c49cd6d78dfd21a8356fea91a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\500b898ee7522bb8a39288e0b0e0bf1c206084c49cd6d78dfd21a8356fea91a9.exe"C:\Users\Admin\AppData\Local\Temp\500b898ee7522bb8a39288e0b0e0bf1c206084c49cd6d78dfd21a8356fea91a9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404