Analysis
-
max time kernel
50s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
17/03/2023, 03:42
Static task
static1
General
-
Target
c527e36f6f036be7c9f5e84eab8a1dbfe7a026cc5360953517dbe44dbb60ecd1.exe
-
Size
279KB
-
MD5
cb79102e9b3f2c59e1c256b6c62edc7e
-
SHA1
5bbda291bbf1f3d146cc27690284f99569ad4ff3
-
SHA256
c527e36f6f036be7c9f5e84eab8a1dbfe7a026cc5360953517dbe44dbb60ecd1
-
SHA512
f77f5bbfe13bb6999b5f67528f07b0ae653edd4bdfc8143310f8112e97528237497bf1640c7a95a86cfe9fffe016636945a28f21db225e73577da8c75bb2f818
-
SSDEEP
6144:IY8woVs5r+17aMNJd5Dnz/1QwppC/vhTJ:IY8wlr82MNJvnzdQwLC3
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4100-117-0x0000000002590000-0x00000000025EA000-memory.dmp family_redline behavioral1/memory/4100-119-0x0000000002780000-0x00000000027D8000-memory.dmp family_redline behavioral1/memory/4100-124-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-125-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-127-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-129-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-131-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-133-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-135-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-137-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-139-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-141-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-143-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-145-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-147-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-149-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-151-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-153-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-155-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-157-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-159-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-161-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-163-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-165-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-167-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-169-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-171-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-173-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-175-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-177-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-179-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-181-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-183-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-185-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline behavioral1/memory/4100-187-0x0000000002780000-0x00000000027D2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4100 c527e36f6f036be7c9f5e84eab8a1dbfe7a026cc5360953517dbe44dbb60ecd1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4100 c527e36f6f036be7c9f5e84eab8a1dbfe7a026cc5360953517dbe44dbb60ecd1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c527e36f6f036be7c9f5e84eab8a1dbfe7a026cc5360953517dbe44dbb60ecd1.exe"C:\Users\Admin\AppData\Local\Temp\c527e36f6f036be7c9f5e84eab8a1dbfe7a026cc5360953517dbe44dbb60ecd1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100