Analysis
-
max time kernel
112s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
b003f6d9c0bd8906430da428326ae036.exe
Resource
win7-20230220-en
General
-
Target
b003f6d9c0bd8906430da428326ae036.exe
-
Size
346KB
-
MD5
b003f6d9c0bd8906430da428326ae036
-
SHA1
914becbecdc7b61d3e33e470f8afb7f966179a89
-
SHA256
c72e7a07d41980a9661d14b951f6149f977be190d96a1379db704c7122b95812
-
SHA512
0f812a072ae81dec1b5102faa8da88319952a84b7f739d2fb3ee678ff8adfae51bc19fc3cddc7aca6cf51b8a625222a23c81691d9faa4bc72ee0ec34ed1353c4
-
SSDEEP
6144:FTLzCoD+Ln6sbBd9drYIHIYuZUraaEzRRAE:1yoD+jVbBrNYIHIhZ6aaE
Malware Config
Extracted
redline
GuruInst
176.124.215.40:44406
-
auth_value
e4baf3ebcf790a17039085111018c9e0
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/2676-139-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-140-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-142-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-144-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-146-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-148-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-150-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-152-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-154-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-156-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-158-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-160-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-162-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-164-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-166-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-168-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-170-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-172-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-174-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-176-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-178-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-180-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-182-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-184-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-186-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-188-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-190-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-192-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-194-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-196-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-198-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-200-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline behavioral2/memory/2676-202-0x0000000004E50000-0x0000000004EA2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3596 2676 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 b003f6d9c0bd8906430da428326ae036.exe 2676 b003f6d9c0bd8906430da428326ae036.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2676 b003f6d9c0bd8906430da428326ae036.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b003f6d9c0bd8906430da428326ae036.exe"C:\Users\Admin\AppData\Local\Temp\b003f6d9c0bd8906430da428326ae036.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 15202⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2676 -ip 26761⤵PID:3552