Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2023 04:23
Static task
static1
Behavioral task
behavioral1
Sample
834ba5e1882127065cdcd09cda30b47d.exe
Resource
win7-20230621-en
General
-
Target
834ba5e1882127065cdcd09cda30b47d.exe
-
Size
276KB
-
MD5
834ba5e1882127065cdcd09cda30b47d
-
SHA1
48d38d0582fc94a155bb1e4132494319d03ac6db
-
SHA256
c9da44cd96f7879b224feacdae31f4d20ea9ee865be28c46659d645721e6e129
-
SHA512
d542685a697f87e6623a9d73004e4a22474cecc2933c4bc9fe24c5544a305ecc39bd97a512daca197b7aeb09af5a3467733738dd7face0e0c4afc332423f6bda
-
SSDEEP
6144:/FWPM88IzV6H+KHaDyXbbmIRf0Vi8QdQb:/8U88IV6H+0aWLhBgLQdQb
Malware Config
Extracted
redline
bruno
83.97.73.134:19071
-
auth_value
b23e240c277e85ce9d49d6165c0a2b48
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1256 834ba5e1882127065cdcd09cda30b47d.exe 1256 834ba5e1882127065cdcd09cda30b47d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1256 834ba5e1882127065cdcd09cda30b47d.exe