Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/04/2023, 14:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
si507346.exe
Resource
win7-20230220-en
6 signatures
150 seconds
General
-
Target
si507346.exe
-
Size
136KB
-
MD5
49650cdcdc358bb2770f0062abeef88c
-
SHA1
d6f7ec7758e9a80700b81bc7a549838ba99aacac
-
SHA256
79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
-
SHA512
7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
SSDEEP
3072:Rqr6W8DnK7SU1Sq4XJB/ga/Z01YgafJls:RqrWFKa/Z0e
Malware Config
Signatures
-
Detects RedLine infostealer 1 IoCs
resource yara_rule behavioral1/memory/1320-54-0x0000000000D30000-0x0000000000D58000-memory.dmp MALWARE_Win_RedLine -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1320 si507346.exe 1320 si507346.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 si507346.exe