Analysis
-
max time kernel
28s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/06/2023, 00:51
Behavioral task
behavioral1
Sample
0x0006000000014123-96.exe
Resource
win7-20230220-en
General
-
Target
0x0006000000014123-96.exe
-
Size
172KB
-
MD5
6dc757c20eacb920245d2bfe025e8116
-
SHA1
7dfcc57901070d7192a9d00f6a34f3bdd1842c1a
-
SHA256
68edcf0e8f4ec8ad8b328e1cde352d2d79a90f997f75e57e55f458fa269e0458
-
SHA512
b6621d7ccec8bca569df665d401a2af9d6b1bf48d8211bb65f4b9cbd7c072f7313b796a3a027529a667a01e17d46c046e3f6a2893a55e94f4d71b3882973fe83
-
SSDEEP
1536:8/tcDOd2V36sv0W7TwiQjrH0V32ai6xWqlB2fxNiLYQ9VbuyqN9fkyt0GkRM8e8u:6yOUrhD3TiG72fxNbqA5kytf8e8hw
Malware Config
Extracted
redline
muha
83.97.73.129:19068
-
auth_value
3c237e5fecb41481b7af249e79828a46
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 0x0006000000014123-96.exe 2000 0x0006000000014123-96.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 0x0006000000014123-96.exe