Analysis
-
max time kernel
85s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 12:40
Static task
static1
General
-
Target
d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exe
-
Size
465KB
-
MD5
feaf6dccb8fef57e66f746def1632a23
-
SHA1
21dc09d9494d1ae46fe181bf344808aeb74189b6
-
SHA256
d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f
-
SHA512
f468997174512ebf10ea2fe25d543833323d992d6d6633cdd20252e756650c63f6f30d337a0a76c0b35493398072c24dc1353e62f44890c8caf1baedeff2fe16
-
SSDEEP
6144:Z+2BPvZ/gTB5sBEt+Y6uA3qzNbBkF4nOcknlUDPv5PldOyX:Z+2BJmQBEn6WE4nnkneDpPldTX
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3724-136-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-143-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-141-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-145-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-139-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-137-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-147-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-149-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-151-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-155-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-153-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-158-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-162-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-164-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-166-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-168-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-170-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-172-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-174-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-176-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-178-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-180-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-182-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-184-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-186-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-188-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-190-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-192-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-194-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-196-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-198-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-200-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-202-0x00000000051E0000-0x0000000005232000-memory.dmp family_redline behavioral1/memory/3724-944-0x0000000002700000-0x0000000002710000-memory.dmp family_redline behavioral1/memory/3724-942-0x0000000002700000-0x0000000002710000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3276 3724 WerFault.exe d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exepid process 3724 d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exe 3724 d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exedescription pid process Token: SeDebugPrivilege 3724 d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exe"C:\Users\Admin\AppData\Local\Temp\d0bf619f16331d326ab8490779e7feabd879fbc9ee3bf33589c4064945c6fd5f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 12242⤵
- Program crash
PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3724 -ip 37241⤵PID:3408