Analysis
-
max time kernel
67s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 14:01
Static task
static1
General
-
Target
ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68.exe
-
Size
314KB
-
MD5
0ef6f7e1bd3cc28e0731eadb63c2ad25
-
SHA1
f2bcafbd0a715bbf7d4cdeef4d2a14440ae9db36
-
SHA256
ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68
-
SHA512
2b0ef1fc5f3e75744de78b18963ce608a5ea5b5cb011be2bd419a446ce0af3941f7b75f82be74ac40b615f28ba07153d9bdd0aec5e936f87cf0f5cdcca3374be
-
SSDEEP
6144:l2XgXI9u4OFT1DDA0qmyRn0c19fQbWeE4uhHe:u7uvFTZAxmI0cxeCH
Malware Config
Extracted
redline
@Germany
185.11.61.125:22344
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2692-139-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-140-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-142-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-144-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-146-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-148-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-150-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-152-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-154-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-156-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-158-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-160-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-162-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-164-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-166-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-168-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-170-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-172-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-174-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-176-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-178-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-180-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-182-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-184-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-186-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-188-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-190-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-192-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-194-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-196-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-198-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-200-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline behavioral1/memory/2692-202-0x0000000004C10000-0x0000000004C62000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3596 2692 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68.exe"C:\Users\Admin\AppData\Local\Temp\ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 19082⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2692 -ip 26921⤵PID:4092