Analysis
-
max time kernel
54s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/03/2023, 11:28
Static task
static1
General
-
Target
750fe313ef34f9b03c9129d60e8665267d77720cd41834094a1f0eaa55ed1367.exe
-
Size
390KB
-
MD5
831cceddd6d26f7c08989fe0c2ce46de
-
SHA1
ebc25627d8a55c793578f7ef51d7d8757e6caf16
-
SHA256
750fe313ef34f9b03c9129d60e8665267d77720cd41834094a1f0eaa55ed1367
-
SHA512
e7e59dcb180b16bf5966df0730ed3c97faf337e26ddb47d55eb77b17b447a63569e54d5b43f33f9cc6bd9c4f988974732831ac73b371e847c85c3e81a9e17edf
-
SSDEEP
6144:05oLhwQKVAQ4EVrxVLkOAEQ3HQOTIfCzHFlqS:05odwQKVAyrxVuEQ3wOMfCHqS
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4308-122-0x0000000004C30000-0x0000000004C8A000-memory.dmp family_redline behavioral1/memory/4308-124-0x0000000007770000-0x00000000077C8000-memory.dmp family_redline behavioral1/memory/4308-128-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-129-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-131-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-133-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-135-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-137-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-139-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-141-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-143-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-145-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-147-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-149-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-151-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-153-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-155-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-157-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-159-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-161-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-163-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-165-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-167-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-169-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-171-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-173-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-175-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-177-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-179-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-181-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-183-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-185-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-187-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-189-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline behavioral1/memory/4308-191-0x0000000007770000-0x00000000077C2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4308 750fe313ef34f9b03c9129d60e8665267d77720cd41834094a1f0eaa55ed1367.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4308 750fe313ef34f9b03c9129d60e8665267d77720cd41834094a1f0eaa55ed1367.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\750fe313ef34f9b03c9129d60e8665267d77720cd41834094a1f0eaa55ed1367.exe"C:\Users\Admin\AppData\Local\Temp\750fe313ef34f9b03c9129d60e8665267d77720cd41834094a1f0eaa55ed1367.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308