Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
kp865946.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
kp865946.exe
Resource
win10v2004-20230220-en
General
-
Target
kp865946.exe
-
Size
415KB
-
MD5
21816a1a66b91fb16cc812a5f6195b95
-
SHA1
a22c8962e22f4918228fbdb06bbf3b941e994604
-
SHA256
7b091f239f9f3bbc9635610f92615a9300447de3f2fb8122d15ac4905f0ee160
-
SHA512
5ec5405b7af37444cdacbfc727cac4edd9c26018bcdf63192b292aaeb1e06be0cb11b080975287b80be4d9260f4cc1c6236d5d68e779f71bfcba197c7871c50f
-
SSDEEP
6144:8l+QF2f3V8Y1uxu72vBVyqUxWYYZUpVGO9/RzudNDd/EP1:8HF2f36uujhZU+dNx/E
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3012-932-0x0000000007670000-0x0000000007C88000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 kp865946.exe