Analysis
-
max time kernel
61s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 04:31
Static task
static1
General
-
Target
aa4a86c9a7275d5c90a8b9c6f136f236339595d907f32dd5da3705f73ac4d591.exe
-
Size
329KB
-
MD5
f583de99e334b56d35a5304e1f194df5
-
SHA1
d6f14cfd1e3995fa91f29c1b22da76e54c9089e7
-
SHA256
aa4a86c9a7275d5c90a8b9c6f136f236339595d907f32dd5da3705f73ac4d591
-
SHA512
d1d182babb56ab5d479181fa6565584bb3c6f8ea51e237a43d343cdd7170c9cd3dbc8385982f70403145dcb7a641af98c7619b36d004227fca3dcad42b4bf209
-
SSDEEP
6144:W3c4mXez13OUkqKVJHsEkDTMbJH96fM9KbE83vW:WMTXezpOUkqKVJbOaHjYI8+
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1736-138-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-137-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-140-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-142-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-144-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-146-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-148-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-150-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-152-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-154-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-156-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-158-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-160-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-162-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-164-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-166-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-168-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-170-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-172-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-174-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-176-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-178-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-180-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-182-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-184-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-186-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-188-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-190-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-192-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-194-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-196-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-198-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline behavioral1/memory/1736-200-0x0000000004E00000-0x0000000004E52000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3632 1736 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1736 aa4a86c9a7275d5c90a8b9c6f136f236339595d907f32dd5da3705f73ac4d591.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1736 aa4a86c9a7275d5c90a8b9c6f136f236339595d907f32dd5da3705f73ac4d591.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa4a86c9a7275d5c90a8b9c6f136f236339595d907f32dd5da3705f73ac4d591.exe"C:\Users\Admin\AppData\Local\Temp\aa4a86c9a7275d5c90a8b9c6f136f236339595d907f32dd5da3705f73ac4d591.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 12242⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1736 -ip 17361⤵PID:2700