Analysis
-
max time kernel
86s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 18:06
Static task
static1
General
-
Target
c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173.exe
-
Size
327KB
-
MD5
7ef86dfbf6033a6e09b2a1d39c9c1561
-
SHA1
0c5b193712c9fe8951df26874f8b9db0897cf629
-
SHA256
c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173
-
SHA512
7f3e412e3b2a04010f93ba027abacc9556fad414c2348f007a216e47c0b0e003b462a74abfaf3bde04f8343526b88a06e129e8effddf1be94cabf1b78794efe8
-
SSDEEP
6144:he0L/RjlltabCPRiJ94XB22Bzq6yIJ2U2i+w33TBjlLe:he0tpDa+Rib4XBd8IvAw3Fj
Malware Config
Extracted
redline
@Germany
185.11.61.125:22344
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/2476-123-0x0000000002630000-0x000000000268A000-memory.dmp family_redline behavioral1/memory/2476-125-0x0000000002A10000-0x0000000002A68000-memory.dmp family_redline behavioral1/memory/2476-126-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-127-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-129-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-131-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-133-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-135-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-137-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-139-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-141-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-144-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-148-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-147-0x00000000025B0000-0x00000000025C0000-memory.dmp family_redline behavioral1/memory/2476-150-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-152-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-154-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-156-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-158-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-160-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-162-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-164-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-166-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-168-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-170-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-172-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-174-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-176-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-178-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-180-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-182-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-184-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-186-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-188-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-190-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline behavioral1/memory/2476-192-0x0000000002A10000-0x0000000002A62000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2476 c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173.exe"C:\Users\Admin\AppData\Local\Temp\c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476