Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 13:51
Static task
static1
General
-
Target
df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe
-
Size
426KB
-
MD5
17154963c2dc45772c40d9ab91bb8428
-
SHA1
4bc30597894e53fe2e5fc5df77c8fee23a3a3eb7
-
SHA256
df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611
-
SHA512
0de4a67832d4474b499acace13b210df449534971b778b1dc7d14db024ba502831d82faa5de500615fd4fb244390464ca5b3b2f5069da405140b7425e5f93219
-
SSDEEP
6144:RimcTvSLofM+22tEZHAbCYiEMSKu1Ug5/pcc8ErQZyIG:MvSUfM+LcHCGfu1bnVI
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3308-139-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-140-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-142-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-144-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-146-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-148-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-150-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-152-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-154-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-156-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-160-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-158-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-162-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-164-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-166-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-168-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-170-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-172-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-174-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-176-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-178-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-180-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-182-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-184-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-186-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-188-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-190-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-192-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-194-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-196-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-202-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-200-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline behavioral1/memory/3308-198-0x0000000004C40000-0x0000000004C92000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4928 3308 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3308 df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe 3308 df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3308 df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe"C:\Users\Admin\AppData\Local\Temp\df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 12202⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3308 -ip 33081⤵PID:4448