Analysis
-
max time kernel
142s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
kp160132.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
kp160132.exe
Resource
win10v2004-20230220-en
General
-
Target
kp160132.exe
-
Size
341KB
-
MD5
e19fc45bbf4f45641107932fd33f3902
-
SHA1
34a086b99939cbb7884e7e3e14828cbe2c3051fd
-
SHA256
02f93b19abcb1cbe45ed712fca6d0a12003d4773ae2542e6e0c6beef72f893f0
-
SHA512
d6884f90ab8936bfe05228f6e0b0607b808dc55b48690794b973d34bde0e7a2ed68ea903a18c9add8b362d42623e3273fae97d56fde93f9e9131d80cfda0b37c
-
SSDEEP
6144:4PvSpHugNiXhqlniIVdUNg9LcR6IbPByGEJB5/xgf2g2T:4PvSQqlniIVdUN0cRjbPB6Bx8I
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4804-931-0x0000000009E20000-0x000000000A438000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4804 kp160132.exe