Analysis
-
max time kernel
55s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:42
Static task
static1
General
-
Target
b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51.exe
-
Size
361KB
-
MD5
5cfb0c681086edd3c004f1c09926aef2
-
SHA1
f48a5e0cc2d7f21fed2455e8a5a39ab2eba98907
-
SHA256
b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51
-
SHA512
d4d17cfadaa593231d051e2e3bf8fdda353ca765c182c417674e273e9d0f7a592783b411b04360c4600409bd1b0586e8b79eabc40934cb74d034404ab4d37cc5
-
SSDEEP
6144:ok5yEwbyL8tO3on2QzeOELQJdUqMVw9p2lMaZtP0QDoh0V:dmbyotOe3R+qMVGorZtP9p
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2320-122-0x0000000002850000-0x00000000028AA000-memory.dmp family_redline behavioral1/memory/2320-128-0x0000000004E40000-0x0000000004E98000-memory.dmp family_redline behavioral1/memory/2320-129-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-130-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-132-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-134-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-136-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-138-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-140-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-142-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-144-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-146-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-148-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-150-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-152-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-154-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-156-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-158-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-160-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-162-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-164-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-166-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-170-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-168-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-172-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-174-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-176-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-178-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-180-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-182-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-184-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-186-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-188-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-190-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline behavioral1/memory/2320-192-0x0000000004E40000-0x0000000004E92000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51.exepid process 2320 b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51.exedescription pid process Token: SeDebugPrivilege 2320 b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51.exe"C:\Users\Admin\AppData\Local\Temp\b1bdbbb118b43102a3d25852e4277b26670af94d2b165b7c9618d3b8a5886b51.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320