Analysis
-
max time kernel
52s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/05/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
d58e1c7aba42a7b02701b0cc8da02b84ed554e16130ff73ddd62502d15d8ffa6.exe
Resource
win10-20230220-en
General
-
Target
d58e1c7aba42a7b02701b0cc8da02b84ed554e16130ff73ddd62502d15d8ffa6.exe
-
Size
397KB
-
MD5
124e6aca3c7cd906d9c281d7568870ae
-
SHA1
e2ccae945e4def48a88b968824569ee688d2b9c2
-
SHA256
d58e1c7aba42a7b02701b0cc8da02b84ed554e16130ff73ddd62502d15d8ffa6
-
SHA512
83ff13355e4cd5a6989c72b1817187ada395acb7ff0cd4bd96ff8dd32019a3c2085fa59af3b1bcec08ad760e337c97ce751bc3b08c39b92c01c1ad20d54be285
-
SSDEEP
6144:rPVq2Q5s0JOLlPl5IqBNP3kwGu1hn5B0ZknBEmKr2eSiQLQIT:Rq9s3lhBNN3MZknBfO2eSi8QY
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/3208-123-0x0000000002550000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/3208-128-0x0000000002690000-0x00000000026BC000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3208 d58e1c7aba42a7b02701b0cc8da02b84ed554e16130ff73ddd62502d15d8ffa6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3208 d58e1c7aba42a7b02701b0cc8da02b84ed554e16130ff73ddd62502d15d8ffa6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d58e1c7aba42a7b02701b0cc8da02b84ed554e16130ff73ddd62502d15d8ffa6.exe"C:\Users\Admin\AppData\Local\Temp\d58e1c7aba42a7b02701b0cc8da02b84ed554e16130ff73ddd62502d15d8ffa6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3208