Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
02/07/2023, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
66fb28e4b766146dbae33ea92ad05c72.exe
Resource
win7-20230621-en
General
-
Target
66fb28e4b766146dbae33ea92ad05c72.exe
-
Size
262KB
-
MD5
66fb28e4b766146dbae33ea92ad05c72
-
SHA1
3bb19d545978cabfd7e3a7f88e105eabecb56e13
-
SHA256
fb2b7cb2cf55252df501a8837271ac156ea42d5b18a664961787c6c5c21ebf70
-
SHA512
9ec5579e0e9c0e680b34c7e3c4f5bb5eca4f473ee63bbc9d0cc51ddaffadaf07301dfb328f50825cd048983774331df8b77179c51147f8537a113a13fd1b85b3
-
SSDEEP
3072:y+FJdh44fOWS4c+PB69yTFqvPXTTR6H+KH4DDyXAjqpRm7MRTr5yOauYrbROYzpD:yPqOec+IzV6H+KHaDyXbbmIRf0V6a
Malware Config
Extracted
redline
bruno
83.97.73.134:19071
-
auth_value
b23e240c277e85ce9d49d6165c0a2b48
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1964 66fb28e4b766146dbae33ea92ad05c72.exe 1964 66fb28e4b766146dbae33ea92ad05c72.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 66fb28e4b766146dbae33ea92ad05c72.exe