Analysis
-
max time kernel
78s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2023, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
aef023fe3a4cdd390e4098d2d5923ffe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
aef023fe3a4cdd390e4098d2d5923ffe.exe
Resource
win10v2004-20230621-en
General
-
Target
aef023fe3a4cdd390e4098d2d5923ffe.exe
-
Size
391KB
-
MD5
aef023fe3a4cdd390e4098d2d5923ffe
-
SHA1
38ef5325158e5e64e9772b5cf0c682a9a370aa6b
-
SHA256
678c669f166984dad4acb1f9aefa2ce5ca144d931d21f3e48e1a1de2bed78ec6
-
SHA512
ee86c32e2fec007634095350e0e4d1acea9597a73a148d637c49bb5aa67b071e7feffc5436d4d585a474f3fb4f437772a053a39dbd760d7a22488b0d05176bc8
-
SSDEEP
6144:SkSpLghKZe0fSbUO+YI7N5ENcTyX2VU5YpEI+AcX0SXj:0pLgh3wp7N5Emy6pEI+AcX0Aj
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/2988-140-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-138-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-142-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-144-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-146-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-148-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-150-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-152-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-154-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-156-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-158-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-160-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-162-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-164-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-166-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-168-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-170-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-172-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-174-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-176-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-178-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-180-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-182-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-184-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-186-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-188-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-190-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-192-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-194-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-196-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-198-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-200-0x0000000006260000-0x0000000006296000-memory.dmp family_redline behavioral2/memory/2988-202-0x0000000006260000-0x0000000006296000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2988 aef023fe3a4cdd390e4098d2d5923ffe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 aef023fe3a4cdd390e4098d2d5923ffe.exe