Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2023, 09:54
Behavioral task
behavioral1
Sample
0x00020000000224b2-185.exe
Resource
win7-20230220-en
General
-
Target
0x00020000000224b2-185.exe
-
Size
145KB
-
MD5
333a8a36f99e6d521b3580687561e9eb
-
SHA1
75a0498886917925f86489770a05796fbf907637
-
SHA256
acc8420656316cc0f604e6d007c20b35d397899ec5d41ff88e9513bf6406c1b6
-
SHA512
2be6146c4522d43ec7e02dce85ab69bb52da9d0cb960c3b7be6f7a5d5c642977aa8b8ab892533b56d0eb3c33b7765a7ac9da682e7a9b0ed9379fa2ce4d2fa44b
-
SSDEEP
3072:hV+m5cvQmRSNaLcARxRzUYIv3R3TvNhBZV8e8ho:hjG1I9NhBf
Malware Config
Extracted
redline
miran
185.161.248.75:4132
-
auth_value
f1084732cb99b2cbe314a2a565371e6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5100 0x00020000000224b2-185.exe 5100 0x00020000000224b2-185.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5100 0x00020000000224b2-185.exe