Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-07-2023 01:06
Static task
static1
Behavioral task
behavioral1
Sample
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe
Resource
win7-20230712-en
General
-
Target
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe
-
Size
395KB
-
MD5
1f42845cc77788cdff450881958e68a4
-
SHA1
4c9dcbb076b6da2f49ac5d9f8f20aa2c1d428169
-
SHA256
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac
-
SHA512
f87d1884ba6770040aa6485aa488d7e42fe4f10ad856245aeebe3d0bf7383f9e23cb40ef593e3a7c600454fc3685ff252930988a09d49cb3dd23b53e858b832f
-
SSDEEP
3072:OkibvLmLAvc8bH+66gUljGecuHXacRsfeHlLCpeQdc6TXXLiGuLTTLkckC5WL6T:UjCLAbLovcrcBcpesPXXLiGYWRUySm
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
178.32.90.250:29608
-
auth_value
c2955ed3813a798683a185a82e949f88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2388 3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe 2388 3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe"C:\Users\Admin\AppData\Local\Temp\3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388