Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 20:40
Static task
static1
General
-
Target
c5ba98fe888c40de87f7a1930bc0f13f6ae1deee6c53e03271fd5c249980567f.exe
-
Size
375KB
-
MD5
4a9ad4feb6546809785907ac211a982e
-
SHA1
0b9878bfe92b010b38413b4ead9247e4aeebff9c
-
SHA256
c5ba98fe888c40de87f7a1930bc0f13f6ae1deee6c53e03271fd5c249980567f
-
SHA512
773d123357280dcd8bb0342a9d3291f1f69e5fdb280f296503bcb45854fb9683de52f1fab87d787ecd279392eada0b6a99eb3b327575d61d888080574a59cb5d
-
SSDEEP
6144:n6vsrNKpoCpLre4MlFnzdJRfq3qpAS8LgJxqyYTphz/:n6sZK+CNrlMlFnzOZbLgfdYT3/
Malware Config
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2484-136-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-137-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-140-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-144-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-146-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-148-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-150-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-152-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-154-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-158-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-156-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-160-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-162-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-164-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-166-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-168-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-170-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-172-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-174-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-176-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-178-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-180-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-182-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-184-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-186-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-188-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-190-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-192-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-194-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-196-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-198-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-200-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline behavioral1/memory/2484-202-0x0000000004F50000-0x0000000004FA2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 c5ba98fe888c40de87f7a1930bc0f13f6ae1deee6c53e03271fd5c249980567f.exe 2484 c5ba98fe888c40de87f7a1930bc0f13f6ae1deee6c53e03271fd5c249980567f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 c5ba98fe888c40de87f7a1930bc0f13f6ae1deee6c53e03271fd5c249980567f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ba98fe888c40de87f7a1930bc0f13f6ae1deee6c53e03271fd5c249980567f.exe"C:\Users\Admin\AppData\Local\Temp\c5ba98fe888c40de87f7a1930bc0f13f6ae1deee6c53e03271fd5c249980567f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484