Analysis
-
max time kernel
50s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 21:00
Static task
static1
General
-
Target
fd4d4e7199655504d65f19ef6ed952d9b081f67272982150fcb3ed3b828d32e4.exe
-
Size
361KB
-
MD5
cea150df6bad34b8253c72cd5801fca6
-
SHA1
6f79ce2c24bb977f292fb93473e108da243bd756
-
SHA256
fd4d4e7199655504d65f19ef6ed952d9b081f67272982150fcb3ed3b828d32e4
-
SHA512
c49485b7fa1c74ef36815c7cc26b8324faade9b9fd6ffa1494fd59d8dbb2ad5b524f103799b829b6e0808a00e03c02aed8c75ed9dc3353777a0bb83932c815ee
-
SSDEEP
6144:vlagrOdLmMmHu/NCpXlUAz8lqdxks+rC3fbe1k8yZSL2ZxezaRaY5vKY5F5:tid6MmOl+VU1lqdGs+CPbeZQZ
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3228-123-0x0000000002510000-0x000000000256A000-memory.dmp family_redline behavioral1/memory/3228-125-0x0000000004EE0000-0x0000000004F38000-memory.dmp family_redline behavioral1/memory/3228-129-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-130-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-132-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-134-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-136-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-138-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-140-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-142-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-144-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-146-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-148-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-150-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-152-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-154-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-156-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-158-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-160-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-162-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-164-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-166-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-168-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-170-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-172-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-174-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-176-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-178-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-180-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-182-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-184-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-186-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-188-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-190-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline behavioral1/memory/3228-192-0x0000000004EE0000-0x0000000004F32000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3228 fd4d4e7199655504d65f19ef6ed952d9b081f67272982150fcb3ed3b828d32e4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3228 fd4d4e7199655504d65f19ef6ed952d9b081f67272982150fcb3ed3b828d32e4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4d4e7199655504d65f19ef6ed952d9b081f67272982150fcb3ed3b828d32e4.exe"C:\Users\Admin\AppData\Local\Temp\fd4d4e7199655504d65f19ef6ed952d9b081f67272982150fcb3ed3b828d32e4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228