Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
d70e708d956604b0609f2d8f38cf9a13.exe
Resource
win7-20230703-en
General
-
Target
d70e708d956604b0609f2d8f38cf9a13.exe
-
Size
1.3MB
-
MD5
d70e708d956604b0609f2d8f38cf9a13
-
SHA1
7a2bc1710e7eeebd66991562c28ec59284eba1d4
-
SHA256
5f012ad4ecd9f9afcc262dda16a30156f20bf432d12d98b66f19116d535213a5
-
SHA512
3c571ef8d344cc3699d3b0f77b6fbba4246858c22a3eb94f6aa094d1d3b6efe4f77c08dd939b2efa72294e8a3d7c4db59923e93305c53e4de2114712da51897f
-
SSDEEP
24576:1/x1buwUS/lk5g+OsFK1TpQZRCodm9g02QKGYQkD8:1/7KVS/lySsFSTpQZRCodmG02QdYQkD8
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1388 d70e708d956604b0609f2d8f38cf9a13.exe 1388 d70e708d956604b0609f2d8f38cf9a13.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1388 d70e708d956604b0609f2d8f38cf9a13.exe