Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 16:33
Behavioral task
behavioral1
Sample
0x0009000000012310-996.exe
Resource
win7-20230220-en
General
-
Target
0x0009000000012310-996.exe
-
Size
175KB
-
MD5
b783667d0c585c46827e232ccffe3d3d
-
SHA1
4db4604de14d2fb90545025b4dbdbe1bfdf6d3ca
-
SHA256
d41b7f7d025174a4a44684a50d88f634e6e5ac54338e61043cc330ecdb1a4435
-
SHA512
c24d8d45253f8c7daf2cebe4c80eb0fca527791ae69832a15243ef963ddeb0ab390ffc9b94fdd1812ba1bd16a68a6d3546d217da71a2f826cf6dca43af1c547a
-
SSDEEP
3072:cxqZW11a2kX8fpVvNsgeLDFXhVrxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuv:yqZkpVvWBXh
Malware Config
Extracted
redline
store
193.233.20.32:4125
-
auth_value
e34e5836de4e256271ab56c648765bcd
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3804 0x0009000000012310-996.exe 3804 0x0009000000012310-996.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3804 0x0009000000012310-996.exe