Analysis
-
max time kernel
106s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2023 11:39
Static task
static1
Behavioral task
behavioral1
Sample
R-Unlocker.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
R-Unlocker.exe
Resource
win10v2004-20230621-en
General
-
Target
R-Unlocker.exe
-
Size
275KB
-
MD5
410ed841062196658dd64c3f86b30e23
-
SHA1
347d3c905b966350034982c3867d9916d4b6ce1a
-
SHA256
913451816ee934f6d27f4c6eea7cbe899fd95f2b8c85c5fabeca949dd21e8963
-
SHA512
1d1cefec4ad2d68d534efc7c4e56ed969ea4a57c7c5d02aa73af91e1097ba70463f6c357d76688b47524763501fe9b447772ca95343278f5a6fcc2a304421384
-
SSDEEP
3072:s3YUAcjp1MkkN0kDyNIvapYENPNQ1L4yXyiPh2ypr5y336YnDzHeWRQx2WR3xr:SXMkkN0DbYgNQSyXDc20Hh+QdQZ
Malware Config
Extracted
redline
@basketball_nogoi_na_nahui
94.142.138.4:80
-
auth_value
29d6a68320aef07ed71416abb3302143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4532 R-Unlocker.exe 4532 R-Unlocker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4532 R-Unlocker.exe