Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 12:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
RedLine/RedLine.exe
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
General
-
Target
RedLine/RedLine.exe
-
Size
7.0MB
-
MD5
ea2fabec396e636ba5a93e32b35c982d
-
SHA1
b22c4cb98ca1dce1841457ea252a80cad59cf1da
-
SHA256
19549865d757156623cbdb96d792a9a3d6b5ca22304711499623c5f32f7d9545
-
SHA512
ff50e6163f2a852a7557ef26b45f3ea7e0c38485b412f6c4e33cb93c63755eae5e7c82c2e6cfa02443f52fe27f2e4d126627ebfa16cfdc5928e93d10115c0fdd
-
SSDEEP
192:C6gBr/ZcPgHeXew2tGT6RZRbOpDjTJXNuLVaTjmYHUeqs3iFXdOUT6qLCsz:9UuPGeuw2lRZ1OFuLUTjpUeZqh6qLCW
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3216 RedLine.exe 3216 RedLine.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3216 RedLine.exe