Analysis
-
max time kernel
109s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 15:10
Behavioral task
behavioral1
Sample
0x000400000001da5e-2334.dat.exe
Resource
win7-20230220-en
General
-
Target
0x000400000001da5e-2334.dat.exe
-
Size
169KB
-
MD5
4ea7b47da0a32256b398856128781f82
-
SHA1
516b534d2f17d9cd90166d57faacc9ebac03eb30
-
SHA256
6c1aea1052431f1e043f3906997c3ad6c0d7289263d727c3d6e899e1c2215e98
-
SHA512
5395725958bf0c7b5ca8b86e12dc0e76081ed06fe94f64a7a47ed843e11da7adac804116105114eca45a821ebb38c10736e36566c08779c9f2c563325f0dd12a
-
SSDEEP
1536:ncJK7qlVZRGW4XqrozC3iGOmE+lrcI2nBCTGqV8buV+jys0ausT83wYk98e8he:nc4VVzxNf3qV0/yNausTb8e8he
Malware Config
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0x000400000001da5e-2334.dat.exepid process 1712 0x000400000001da5e-2334.dat.exe 1712 0x000400000001da5e-2334.dat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0x000400000001da5e-2334.dat.exedescription pid process Token: SeDebugPrivilege 1712 0x000400000001da5e-2334.dat.exe