Analysis
-
max time kernel
76s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10-07-2023 20:34
Behavioral task
behavioral1
Sample
2364-56-0x00000000003D0000-0x0000000000404000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2364-56-0x00000000003D0000-0x0000000000404000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2364-56-0x00000000003D0000-0x0000000000404000-memory.exe
-
Size
208KB
-
MD5
5435f7c51c7990309e4d83326b175884
-
SHA1
b76fc1068d7f913c6d2cb307f5af8cc22266e509
-
SHA256
77516a69419ef33dc1dcb68252046fb4f7c899bb4d2ce5fbe5149a54ad5cc982
-
SHA512
8b7fdd7b886700987632b63def3b3031efeb270a19b105154e173c52df2cd9e9e00a5a2b6910c0fa3f915bf8eba799d99110cd3585f353581b49c110822b8bf0
-
SSDEEP
3072:j8vs69J56kC75iEd5b2B6lZsU8BOl2a/N4+khzu68e8hRr:ovs6kkC7zBcjBOl2CNgi6y
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
147.135.165.22:17748
-
auth_value
c2955ed3813a798683a185a82e949f88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 2364-56-0x00000000003D0000-0x0000000000404000-memory.exe 2224 2364-56-0x00000000003D0000-0x0000000000404000-memory.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 2364-56-0x00000000003D0000-0x0000000000404000-memory.exe