Analysis
-
max time kernel
54s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 04:30
Static task
static1
Behavioral task
behavioral1
Sample
qu9158.exe
Resource
win7-20230220-en
General
-
Target
qu9158.exe
-
Size
379KB
-
MD5
23c005bf6be262973e85b907f5933589
-
SHA1
3074e75a7dd20983887699504aee438050f2d988
-
SHA256
b1c19714909ee44027c6b4b71d475eef2c4518851ecdc149fa85f219a43f5cb3
-
SHA512
7516526d2dc56ad6a1bc9255fd63c9ba910042e8c110ca53a684b39d74e204b84784b64640e397e9e51eacddbe1c986114124aa943d2862cd52be2d046bc7f59
-
SSDEEP
6144:Tbvgogp56pv5kHidlxQTx4F97PPoFIkenFZG1nr:TTghpYpvOCVLLsZqFgr
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/4252-138-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-139-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-141-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-143-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-145-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-147-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-149-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-151-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-153-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-155-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-157-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-159-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-161-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-163-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-165-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-167-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-169-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-171-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-173-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-175-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-178-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-180-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-182-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-184-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-186-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-188-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-190-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-192-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-194-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-196-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-198-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-200-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline behavioral2/memory/4252-202-0x00000000072A0000-0x00000000072DE000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4252 qu9158.exe 4252 qu9158.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4252 qu9158.exe