Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-03-2023 15:57
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
355KB
-
MD5
ca83fd117ff78e8e40cab397b074fa36
-
SHA1
8d4ed77add391b1f377dace1d6dd11de83cbf4bb
-
SHA256
9e10cd72fd11418ab2c8c2957c0dfbb981a028d34bcfbaa90c671af4f0b92032
-
SHA512
a88894805832f28bd2ccf1ca56769fe419077f0fa4a6942bb0d595a12d26234b8d2f7609c3a7150d0a2bfd4f3efab81255ea47b3508a34da552ca37e906bbc78
-
SSDEEP
6144:ejeDmfF86gnwhqWp3Xf8KHexLRECe4mqtUfJILh4va:GeyfF8YgCBULRwTMUxIN
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/864-55-0x0000000004850000-0x00000000048AA000-memory.dmp family_redline behavioral1/memory/864-56-0x0000000006F10000-0x0000000006F68000-memory.dmp family_redline behavioral1/memory/864-59-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-60-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-62-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-66-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-68-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-64-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-72-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-70-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-74-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-76-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-78-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-82-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-84-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-80-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-86-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-88-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-90-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-92-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-98-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-96-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-94-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-102-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-100-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-104-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-106-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-108-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-110-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-112-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-114-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-116-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-118-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-120-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-122-0x0000000006F10000-0x0000000006F62000-memory.dmp family_redline behavioral1/memory/864-849-0x0000000007080000-0x00000000070C0000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
file.exepid process 864 file.exe 864 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 864 file.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/864-55-0x0000000004850000-0x00000000048AA000-memory.dmpFilesize
360KB
-
memory/864-56-0x0000000006F10000-0x0000000006F68000-memory.dmpFilesize
352KB
-
memory/864-57-0x0000000000360000-0x00000000003C2000-memory.dmpFilesize
392KB
-
memory/864-58-0x0000000007080000-0x00000000070C0000-memory.dmpFilesize
256KB
-
memory/864-59-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-60-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-62-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-66-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-68-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-64-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-72-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-70-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-74-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-76-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-78-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-82-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-84-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-80-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-86-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-88-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-90-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-92-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-98-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-96-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-94-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-102-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-100-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-104-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-106-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-108-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-110-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-112-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-114-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-116-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-118-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-120-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-122-0x0000000006F10000-0x0000000006F62000-memory.dmpFilesize
328KB
-
memory/864-849-0x0000000007080000-0x00000000070C0000-memory.dmpFilesize
256KB