Analysis
-
max time kernel
54s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 23:11
Static task
static1
General
-
Target
cdd87c9bd2522eb8864be8162c842b8a5317e43cc110f21d91d49ea362e4ba92.exe
-
Size
348KB
-
MD5
28fae6e3f6eaf6826d163f48f2aa96bd
-
SHA1
80e8a8d74cfdda79e6750a0914425adef6dc49de
-
SHA256
cdd87c9bd2522eb8864be8162c842b8a5317e43cc110f21d91d49ea362e4ba92
-
SHA512
cb6f1d56e329a42a702f69a9bef6d0b4531fc1ce6027bc997c6e9827d3c4e9865c5ffba89077b7ed964b3a81f2ba8d992912c6050b972810ca53a6f3474578c3
-
SSDEEP
6144:RIE8HuLKLG0U6HAPtDfGZPhA/1K+qLuUrcsw/i8PxavC7S+cZ:RSuLKi0U6HAlD+vA9K+q9v18PAKGR
Malware Config
Extracted
redline
@Germany
185.11.61.125:22344
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/4124-118-0x0000000002900000-0x000000000295A000-memory.dmp family_redline behavioral1/memory/4124-120-0x0000000004E20000-0x0000000004E78000-memory.dmp family_redline behavioral1/memory/4124-121-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-122-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-124-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-126-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-128-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-130-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-131-0x0000000004F70000-0x0000000004F80000-memory.dmp family_redline behavioral1/memory/4124-134-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-137-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-139-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-141-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-143-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-145-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-147-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-149-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-151-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-153-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-155-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-157-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-159-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-161-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-163-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-167-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-165-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-169-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-171-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-173-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-175-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-177-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-179-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-181-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-183-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-185-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline behavioral1/memory/4124-187-0x0000000004E20000-0x0000000004E72000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4124 cdd87c9bd2522eb8864be8162c842b8a5317e43cc110f21d91d49ea362e4ba92.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4124 cdd87c9bd2522eb8864be8162c842b8a5317e43cc110f21d91d49ea362e4ba92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdd87c9bd2522eb8864be8162c842b8a5317e43cc110f21d91d49ea362e4ba92.exe"C:\Users\Admin\AppData\Local\Temp\cdd87c9bd2522eb8864be8162c842b8a5317e43cc110f21d91d49ea362e4ba92.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124