Analysis
-
max time kernel
54s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 00:42
Static task
static1
General
-
Target
c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98.exe
-
Size
346KB
-
MD5
eb298436f35ffbfa16a7a8b24c43212b
-
SHA1
2bca91453ef12a285d450db7161296685a44aa14
-
SHA256
c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98
-
SHA512
6b52ce1248f5ca5d68f0e68ca79624c1f2ea5d2b4f4681de47bdfe8eab9e824cc8e0c5c7ac97c05d47bc2f1bc10252920bf9e2e447d829cc2190c5d0654c6fa9
-
SSDEEP
6144:eOyp+TLzgxbLPE23Yp8QwOOwMPg0CQBCBc8ezlH:rFTngxbgIfXL/YJQBIez
Malware Config
Extracted
redline
@Germany
185.11.61.125:22344
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4104-118-0x00000000027E0000-0x000000000283A000-memory.dmp family_redline behavioral1/memory/4104-120-0x0000000005370000-0x00000000053C8000-memory.dmp family_redline behavioral1/memory/4104-122-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-123-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-125-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-127-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-129-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-131-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-133-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-135-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-137-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-139-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-141-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-143-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-145-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-147-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-149-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-151-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-153-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-155-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-157-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-159-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-161-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-163-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-165-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-167-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-169-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-171-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-173-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-175-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-177-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-179-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-181-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-183-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline behavioral1/memory/4104-185-0x0000000005370000-0x00000000053C2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98.exepid process 4104 c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98.exedescription pid process Token: SeDebugPrivilege 4104 c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98.exe"C:\Users\Admin\AppData\Local\Temp\c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104