Analysis
-
max time kernel
61s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:46
Behavioral task
behavioral1
Sample
k5942455.exe
Resource
win7-20230220-en
General
-
Target
k5942455.exe
-
Size
169KB
-
MD5
eb3fa57ffeb9407453c567bac09c210e
-
SHA1
b831eaf7a97d153b677fd3b86f44915d6f1f3f0c
-
SHA256
3a57c060d4042c14563187aa50b3ac60f0c58dff10de208593f0f3ec7df65d50
-
SHA512
ffc4c3fd65b592fc280adcbe8013b6bf5bb4d5cc19558799f0295864df29743a8f84e943189eae24346dcbffe5c2f37697ccf46af61c7fb9fac9403955de6f50
-
SSDEEP
1536:TyqlwNqlVZRGWY8HrIGtRSotDaZIPeKNDETGqVqbuFz1CSwx83wYk/8e8hR:Th6D3GtzD263qVeUESwx58e8hR
Malware Config
Extracted
redline
diza
217.196.96.56:4138
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1704 k5942455.exe 1704 k5942455.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 k5942455.exe