Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 11:40
Behavioral task
behavioral1
Sample
1412560x00000000038000000.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1412560x00000000038000000.exe
Resource
win10v2004-20230703-en
General
-
Target
1412560x00000000038000000.exe
-
Size
208KB
-
MD5
870cd03c57605650d014341f59067a5a
-
SHA1
39e22c3a6a64c857c76c4ce743f82a3dbb696c74
-
SHA256
033a98a30d65ee55f12bfd51fc282e6abbc111b1f8c8c1d5d4871abc6b0a0ceb
-
SHA512
9f5a0275b14a76cef86acf29578bb8f7c0d276e16321b56435ce3bcc718690103783e4716136f4ec99814570bda03b6c55b93f6a7c74f2bc76eed9859a425fd9
-
SSDEEP
3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0h:KS4s6Pl1/jUhtcSMtsASRB
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
146.59.161.7:48080
-
auth_value
c2955ed3813a798683a185a82e949f88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1096 1412560x00000000038000000.exe 1096 1412560x00000000038000000.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1096 1412560x00000000038000000.exe