Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:40
Static task
static1
Behavioral task
behavioral1
Sample
931550f6442765e288034980250788695e5e57bc2ec44b1a09fd6115fb5a1e29.exe
Resource
win7-20230220-en
General
-
Target
931550f6442765e288034980250788695e5e57bc2ec44b1a09fd6115fb5a1e29.exe
-
Size
380KB
-
MD5
6ac746b33d45f3a5389023fa3aa38a40
-
SHA1
ed149f7728ffb1cfaa6b9884522647dad1dd261b
-
SHA256
931550f6442765e288034980250788695e5e57bc2ec44b1a09fd6115fb5a1e29
-
SHA512
dff49074f5b26182060eaecf257189a2c4cfca37295f4150fde8a3465ebcb58283cb1f768a0f6793668deaa1e9bd66bfeaf9a926ae85771f10739fbe850d0093
-
SSDEEP
6144:qRnxyU+DIM5nSAy6YbWYYo4zsxDOdu6Q0KgT8S/ANN4T:qRnxt+Ddt49tvOrlT2N
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/1512-136-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-137-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-139-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-141-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-143-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-145-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-148-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-151-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-154-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-156-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-158-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-160-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-162-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-164-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-166-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-168-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-170-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-172-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-174-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-176-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-178-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-180-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-182-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-184-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-186-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-188-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-190-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-192-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-194-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-196-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-198-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-200-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline behavioral2/memory/1512-202-0x0000000004FD0000-0x0000000005022000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3420 1512 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1512 931550f6442765e288034980250788695e5e57bc2ec44b1a09fd6115fb5a1e29.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1512 931550f6442765e288034980250788695e5e57bc2ec44b1a09fd6115fb5a1e29.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\931550f6442765e288034980250788695e5e57bc2ec44b1a09fd6115fb5a1e29.exe"C:\Users\Admin\AppData\Local\Temp\931550f6442765e288034980250788695e5e57bc2ec44b1a09fd6115fb5a1e29.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 12242⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1512 -ip 15121⤵PID:1612