Analysis
-
max time kernel
64s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-04-2023 11:17
Static task
static1
Behavioral task
behavioral1
Sample
e0888920ecf5282f98cc62836905ecdd.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e0888920ecf5282f98cc62836905ecdd.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
e0888920ecf5282f98cc62836905ecdd.bin.exe
-
Size
553KB
-
MD5
e0888920ecf5282f98cc62836905ecdd
-
SHA1
3e954e4030869d99ecbaf6503acafd1ef4a81dbf
-
SHA256
f57536badf2858c34c301bc1fd7e237a1f700f3e48c6563cdf4ada287d1151f2
-
SHA512
ab8fd95c90930875b3db507c75ec5d883b1b73966129df31dc300ebe2d6ee6b7fb540d7bd46e5dedcf88ab3affa5713ae408f57081dd54e6323ee06f99b9a7ea
-
SSDEEP
12288:C2iNqgIbuMjFxhqrvhf1TP2TmQs2e9hpqW7dwY5DVjuAk1aGL:C1wgWvhQvhfdP3LqW7Tvju3aGL
Malware Config
Extracted
redline
1379752987
107.167.69.80:28253
-
auth_value
94039ae8b5b0b9ec5346501cc0139461
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1240 set thread context of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 e0888920ecf5282f98cc62836905ecdd.bin.exe 1424 e0888920ecf5282f98cc62836905ecdd.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1424 e0888920ecf5282f98cc62836905ecdd.bin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27 PID 1240 wrote to memory of 1424 1240 e0888920ecf5282f98cc62836905ecdd.bin.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-