Analysis
-
max time kernel
128s -
max time network
257s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
07/07/2023, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
l6556851.exe
Resource
win7-20230703-en
General
-
Target
l6556851.exe
-
Size
255KB
-
MD5
33dca6e427d88bd928e9c0b2e5b3debe
-
SHA1
2aba25fcb1804a19411ff3784f09f335d5bb3a96
-
SHA256
05ddd969561f5bcba838bde9c4684e14cff4af02183d072937ebbee9e4f869e5
-
SHA512
bcf698366b74c09a819d44440a71038fb3c3192f1d397c19b8f8db2bb2b7ef00fd8a24f545527d378d2917788211fcd5977d09b50909574f7e38a0a3ae21db15
-
SSDEEP
6144:xB3Oz5up+ly2WtzH7NrIrBJjvft5LZFL92hUPEIPl:xB3OzwIYR0vfjZZ92hUF
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3928 l6556851.exe 3928 l6556851.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3928 l6556851.exe