Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-03-2023 02:52
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
355KB
-
MD5
c841f3ba54ae59f29d9e1726e2ea4224
-
SHA1
151b055e592b2c5ab607d33b3a1b4cf1bfcc5134
-
SHA256
6e9f3672d9c38849c09db4e94e1702b04649ad2197cffbcf4ff6994df7a33259
-
SHA512
ff6d1c7de020ea5079f098c2f98fd930df67e99ce60d5cb19cc45a80bff3293c9b1686f0f1ecb0baf4d97242eb22a72c6b21cd309986039ebad38e01c52482e9
-
SSDEEP
6144:+/D+ApNi6b4+CbrhP6urMU9mPnVqE8rVhRwtIEqUJZWf:+L+ApNiCzCbR6urP9mvILVm0cZWf
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/1232-55-0x0000000004800000-0x000000000485A000-memory.dmp family_redline behavioral1/memory/1232-56-0x0000000004860000-0x00000000048B8000-memory.dmp family_redline behavioral1/memory/1232-57-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-58-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-62-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-65-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-67-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-71-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-69-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-73-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-75-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-77-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-79-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-85-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-87-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-83-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-81-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-91-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-89-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-93-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-95-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-97-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-105-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-103-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-101-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-99-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-107-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-109-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-111-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-113-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-117-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-119-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-115-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-121-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-123-0x0000000004860000-0x00000000048B2000-memory.dmp family_redline behavioral1/memory/1232-850-0x00000000070F0000-0x0000000007130000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
file.exepid process 1232 file.exe 1232 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 1232 file.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1232-55-0x0000000004800000-0x000000000485A000-memory.dmpFilesize
360KB
-
memory/1232-56-0x0000000004860000-0x00000000048B8000-memory.dmpFilesize
352KB
-
memory/1232-57-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-59-0x0000000000250000-0x00000000002B2000-memory.dmpFilesize
392KB
-
memory/1232-61-0x00000000070F0000-0x0000000007130000-memory.dmpFilesize
256KB
-
memory/1232-58-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-63-0x00000000070F0000-0x0000000007130000-memory.dmpFilesize
256KB
-
memory/1232-62-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-65-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-67-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-71-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-69-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-73-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-75-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-77-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-79-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-85-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-87-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-83-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-81-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-91-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-89-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-93-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-95-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-97-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-105-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-103-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-101-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-99-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-107-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-109-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-111-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-113-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-117-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-119-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-115-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-121-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-123-0x0000000004860000-0x00000000048B2000-memory.dmpFilesize
328KB
-
memory/1232-850-0x00000000070F0000-0x0000000007130000-memory.dmpFilesize
256KB