Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 04:30
Static task
static1
Behavioral task
behavioral1
Sample
qu9158.exe
Resource
win7-20230220-en
General
-
Target
qu9158.exe
-
Size
379KB
-
MD5
23c005bf6be262973e85b907f5933589
-
SHA1
3074e75a7dd20983887699504aee438050f2d988
-
SHA256
b1c19714909ee44027c6b4b71d475eef2c4518851ecdc149fa85f219a43f5cb3
-
SHA512
7516526d2dc56ad6a1bc9255fd63c9ba910042e8c110ca53a684b39d74e204b84784b64640e397e9e51eacddbe1c986114124aa943d2862cd52be2d046bc7f59
-
SSDEEP
6144:Tbvgogp56pv5kHidlxQTx4F97PPoFIkenFZG1nr:TTghpYpvOCVLLsZqFgr
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 38 IoCs
resource yara_rule behavioral1/memory/1236-56-0x0000000004510000-0x0000000004556000-memory.dmp family_redline behavioral1/memory/1236-57-0x00000000047E0000-0x0000000004824000-memory.dmp family_redline behavioral1/memory/1236-58-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-59-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-61-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-63-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-67-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-65-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-71-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-69-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-75-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-73-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-77-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-83-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-80-0x0000000007120000-0x0000000007160000-memory.dmp family_redline behavioral1/memory/1236-79-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-87-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-85-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-91-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-89-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-93-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-97-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-95-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-99-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-103-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-101-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-105-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-109-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-107-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-111-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-113-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-115-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-119-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-117-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-123-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-121-0x00000000047E0000-0x000000000481E000-memory.dmp family_redline behavioral1/memory/1236-966-0x0000000007120000-0x0000000007160000-memory.dmp family_redline behavioral1/memory/1236-968-0x0000000007120000-0x0000000007160000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 qu9158.exe 1236 qu9158.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 qu9158.exe