Analysis
-
max time kernel
60s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 08:40
Static task
static1
General
-
Target
1ea13de382209a302d2ca34ba240ec997eef536969da8251b6566b0ec1fdfb1b.exe
-
Size
354KB
-
MD5
f42d1dad2a44ebf55afc3c11ac5e26af
-
SHA1
c114fe8506fe289f10def5068e5d0f8e278dda88
-
SHA256
1ea13de382209a302d2ca34ba240ec997eef536969da8251b6566b0ec1fdfb1b
-
SHA512
6dac7372860ed5eb3b28deb0429d7b137799b62eb59519d51730b3063d2fb37479be97b450590cad810ac781a61a50eb9da739092ddeba09c2655ceebd15353b
-
SSDEEP
6144:SpkELVUWXiTuwLNpPs2dX0EBbHBbShlkoHJ93C:GkEpUWXDw51Skc
Malware Config
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3456-137-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-136-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-139-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-141-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-143-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-146-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-150-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-152-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-154-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-156-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-158-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-160-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-162-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-164-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-166-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-168-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-170-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-172-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-174-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-176-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-178-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-180-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-182-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-184-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-186-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-188-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-190-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-192-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-194-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-196-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-198-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-200-0x0000000005440000-0x0000000005492000-memory.dmp family_redline behavioral1/memory/3456-202-0x0000000005440000-0x0000000005492000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3456 1ea13de382209a302d2ca34ba240ec997eef536969da8251b6566b0ec1fdfb1b.exe 3456 1ea13de382209a302d2ca34ba240ec997eef536969da8251b6566b0ec1fdfb1b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3456 1ea13de382209a302d2ca34ba240ec997eef536969da8251b6566b0ec1fdfb1b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ea13de382209a302d2ca34ba240ec997eef536969da8251b6566b0ec1fdfb1b.exe"C:\Users\Admin\AppData\Local\Temp\1ea13de382209a302d2ca34ba240ec997eef536969da8251b6566b0ec1fdfb1b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456