Analysis
-
max time kernel
57s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2023 07:58
Static task
static1
General
-
Target
d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409.exe
-
Size
376KB
-
MD5
087bf72cccfd8c865940dc6a51284828
-
SHA1
609b83cd903bc345801d8a86d5d74d828e79c239
-
SHA256
d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409
-
SHA512
0841ad16510c9f5c3740232daab1ef643e7438f203bb225e24a33378bfd24a20b011a784817674f4173b3e6446c86c2e41b31a33830b05ca95186ee150b9fb49
-
SSDEEP
6144:9VIs9M/TWoX5cMe4tpd8QBDEFCixXB/xmuaUno9ATSb6a:9VIs9MrWuQ4tj8Q2Zxx/xmB6No
Malware Config
Extracted
redline
@Germany
185.11.61.125:22344
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4404-123-0x0000000004C10000-0x0000000004C6A000-memory.dmp family_redline behavioral1/memory/4404-125-0x0000000004E10000-0x0000000004E68000-memory.dmp family_redline behavioral1/memory/4404-129-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-130-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-132-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-134-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-136-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-138-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-140-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-142-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-144-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-146-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-148-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-150-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-152-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-154-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-156-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-158-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-160-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-162-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-164-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-166-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-168-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-170-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-172-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-176-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-178-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-174-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-180-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-182-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-184-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-186-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-188-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-190-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline behavioral1/memory/4404-192-0x0000000004E10000-0x0000000004E62000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409.exepid process 4404 d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409.exedescription pid process Token: SeDebugPrivilege 4404 d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409.exe"C:\Users\Admin\AppData\Local\Temp\d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404