Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/03/2023, 02:02
Static task
static1
General
-
Target
75cc8e8f5aaadc73e0f79c92a09a68d6a0cfd824928198776158ea591eb40405.exe
-
Size
379KB
-
MD5
44a0ad3e5c6e02e553d379dd6a178b56
-
SHA1
bbdf133728bb569536d8979881161a91775d2a06
-
SHA256
75cc8e8f5aaadc73e0f79c92a09a68d6a0cfd824928198776158ea591eb40405
-
SHA512
032206b7f49d6b9150ee2c866bc76fbc1dcbdd6857d892e072c42cdf040f567de528ce265b2fd153f507975ca672c1d39edbff5b5188bc95dc8144e71d1e2ae2
-
SSDEEP
6144:YxAQHcMSKAHgKzXzMJZVqBV0IsfVR6mrTfz:YxA3MHAjzXe+vvstXz
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2476-123-0x0000000004D90000-0x0000000004DEA000-memory.dmp family_redline behavioral1/memory/2476-125-0x0000000004F70000-0x0000000004FC8000-memory.dmp family_redline behavioral1/memory/2476-126-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-127-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-129-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-131-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-133-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-135-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-137-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-139-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-141-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-143-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-145-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-147-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-150-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-154-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-156-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-158-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-160-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-162-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-164-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-166-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-168-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-170-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-172-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-174-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-176-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-178-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-180-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-182-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-184-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-186-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-188-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-190-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline behavioral1/memory/2476-192-0x0000000004F70000-0x0000000004FC2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2476 75cc8e8f5aaadc73e0f79c92a09a68d6a0cfd824928198776158ea591eb40405.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 75cc8e8f5aaadc73e0f79c92a09a68d6a0cfd824928198776158ea591eb40405.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75cc8e8f5aaadc73e0f79c92a09a68d6a0cfd824928198776158ea591eb40405.exe"C:\Users\Admin\AppData\Local\Temp\75cc8e8f5aaadc73e0f79c92a09a68d6a0cfd824928198776158ea591eb40405.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476