Analysis
-
max time kernel
84s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
d48b7231fd570af2d33fb7730a5d37a4ff72ca4b8208bcfd028153dc518a19d7.exe
Resource
win10v2004-20230221-en
General
-
Target
d48b7231fd570af2d33fb7730a5d37a4ff72ca4b8208bcfd028153dc518a19d7.exe
-
Size
298KB
-
MD5
5a8fa2126934ea568348d89dbb700d81
-
SHA1
84dc12637c3774a4da6cd5e1ba19e9a6cc39f45d
-
SHA256
d48b7231fd570af2d33fb7730a5d37a4ff72ca4b8208bcfd028153dc518a19d7
-
SHA512
9d28981e8ecda7eb4726f9dc174e530a3bdf59c4567e1627217f32ce80756e81971bec5e1273570871b0c08ec424d86fc08c8b8f1b2a8dad68a224cfe2ec57ef
-
SSDEEP
6144:tXqBZDNcmzn0Lp+WfiE2Xkr0VjPamEseQuyoC78xo:t6nDGvr6E20CLavbC7S
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4856-138-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-139-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-141-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-143-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-145-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-147-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-149-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-151-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-153-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-155-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-157-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-159-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-161-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-163-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-165-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-167-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-169-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-171-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-173-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-175-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-177-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-179-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-181-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-183-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-185-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-187-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-189-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-191-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-193-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-195-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-197-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-199-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline behavioral1/memory/4856-201-0x00000000028A0000-0x00000000028F2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2560 4856 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4856 d48b7231fd570af2d33fb7730a5d37a4ff72ca4b8208bcfd028153dc518a19d7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4856 d48b7231fd570af2d33fb7730a5d37a4ff72ca4b8208bcfd028153dc518a19d7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48b7231fd570af2d33fb7730a5d37a4ff72ca4b8208bcfd028153dc518a19d7.exe"C:\Users\Admin\AppData\Local\Temp\d48b7231fd570af2d33fb7730a5d37a4ff72ca4b8208bcfd028153dc518a19d7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 12242⤵
- Program crash
PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4856 -ip 48561⤵PID:4988