Analysis
-
max time kernel
50s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-03-2023 23:48
Static task
static1
Behavioral task
behavioral1
Sample
f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873.exe
Resource
win10-20230220-en
General
-
Target
f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873.exe
-
Size
303KB
-
MD5
c5adf9e2557d7e355f3a35e14ca548c5
-
SHA1
e22f2da47479109975286078603eb65ebec80a1c
-
SHA256
f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873
-
SHA512
9162b7d173bbc04f3a3d6a278bddfecc398845c0d92929459f4eaec99b32a60954113e0a83194c0080ae6302d94bc619dd4bcea27a0374dfff88f18b1175a25d
-
SSDEEP
6144:+FJ/71oQo2FCOXyCrdiGGEFCvDa3AUd+WpXzd:ol71o7mymdnGEFEaQUMWpx
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4452-121-0x0000000002500000-0x000000000255A000-memory.dmp family_redline behavioral1/memory/4452-123-0x0000000004BB0000-0x0000000004C08000-memory.dmp family_redline behavioral1/memory/4452-128-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-129-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-131-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-133-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-135-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-137-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-139-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-141-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-143-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-145-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-147-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-149-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-151-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-153-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-155-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-157-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-159-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-161-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-163-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-165-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-167-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-169-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-171-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-173-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-175-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-177-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-179-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-181-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-183-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-185-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-187-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-189-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline behavioral1/memory/4452-191-0x0000000004BB0000-0x0000000004C02000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4452 f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873.exe 4452 f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4452 f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873.exe"C:\Users\Admin\AppData\Local\Temp\f70df97251d3eccbc1516c3e30d91e4eab205397627cef54e93cf7c4c3bb2873.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452