Analysis
-
max time kernel
88s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:20
Static task
static1
General
-
Target
34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db.exe
-
Size
346KB
-
MD5
6093557e3e84e5ed1b2835e84941df6b
-
SHA1
24db3355c0ff0e30def3e3a99498d2f30cc66cf2
-
SHA256
34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db
-
SHA512
ecefc5eccc7c88a537681a33267598da43c32dbe2961a0fe09e4f4369a280b3cdefb1cc15810e9bcaf55ecd810511c50faf5cda32b0f08adf9a68023a276da8a
-
SSDEEP
6144:3jMa+DDRLY6IEBPrmffXL/ZtzJkM3ccZDUze:TcDDREJKPKffXL/Lz/D
Malware Config
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2548-136-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-137-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-139-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-141-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-144-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-148-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-150-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-152-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-154-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-156-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-158-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-160-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-162-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-164-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-166-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-168-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-170-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-172-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-174-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-176-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-178-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-180-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-182-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-184-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-186-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-188-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-190-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-192-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-194-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-196-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-198-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-200-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline behavioral1/memory/2548-202-0x0000000004D20000-0x0000000004D72000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2648 2548 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2548 34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db.exe 2548 34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db.exe"C:\Users\Admin\AppData\Local\Temp\34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 22162⤵
- Program crash
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2548 -ip 25481⤵PID:2160