Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
12-07-2023 01:52
Static task
static1
Behavioral task
behavioral1
Sample
7868e7c5e31315e7bb442bafbbc16addfeb4bda998b404491976aa271fbb78ef.exe
Resource
win7-20230703-en
General
-
Target
7868e7c5e31315e7bb442bafbbc16addfeb4bda998b404491976aa271fbb78ef.exe
-
Size
328KB
-
MD5
bf447368e9d3f0ec34cd63d370831979
-
SHA1
6d1ed6f41e7d2b566fe26eedc778eb5582c4a7bd
-
SHA256
7868e7c5e31315e7bb442bafbbc16addfeb4bda998b404491976aa271fbb78ef
-
SHA512
63e9feafb1adc3f008474a5f66bd498fb62fa3e2719abca0a7668ed04fb194b8e0d5d00bb37ee316a9d5972182cda7520aaf21148a0b0ab903873c6a522d38a4
-
SSDEEP
6144:Yh+KLEk1qBC7ZyyZ684FVdQqZNlbU4yalCHFU4+gb5gFlr:k+Kgk1x4XV93lQ4yalsU47b
Malware Config
Extracted
redline
@Germany
194.26.135.162:2920
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2336-55-0x0000000001D70000-0x0000000001D9C000-memory.dmp family_redline behavioral1/memory/2336-56-0x0000000001E70000-0x0000000001E98000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2336 7868e7c5e31315e7bb442bafbbc16addfeb4bda998b404491976aa271fbb78ef.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2336 7868e7c5e31315e7bb442bafbbc16addfeb4bda998b404491976aa271fbb78ef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7868e7c5e31315e7bb442bafbbc16addfeb4bda998b404491976aa271fbb78ef.exe"C:\Users\Admin\AppData\Local\Temp\7868e7c5e31315e7bb442bafbbc16addfeb4bda998b404491976aa271fbb78ef.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336