Overview
overview
10Static
static
10Setup 2.1.exe
windows7-x64
10Setup 2.1.exe
windows10-2004-x64
10data.bin
windows7-x64
3data.bin
windows10-2004-x64
3libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libeay32.dll
windows7-x64
1libeay32.dll
windows10-2004-x64
1libgcc_s_dw2-1.dll
windows7-x64
3libgcc_s_dw2-1.dll
windows10-2004-x64
3libwinpthread-1.dll
windows7-x64
1libwinpthread-1.dll
windows10-2004-x64
1msvcp100.dll
windows7-x64
3msvcp100.dll
windows10-2004-x64
3msvcp140.dll
windows7-x64
3msvcp140.dll
windows10-2004-x64
3msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3opengl32sw.dll
windows7-x64
1opengl32sw.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 11:53
Behavioral task
behavioral1
Sample
Setup 2.1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Setup 2.1.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
data.bin
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
data.bin
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
libEGL.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
libEGL.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
libeay32.dll
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
libeay32.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
libgcc_s_dw2-1.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
libgcc_s_dw2-1.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
libwinpthread-1.dll
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
libwinpthread-1.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
msvcp100.dll
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
msvcp100.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
msvcp140.dll
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
msvcp140.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
msvcr100.dll
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
msvcr100.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
opengl32sw.dll
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
opengl32sw.dll
Resource
win10v2004-20230703-en
General
-
Target
Setup 2.1.exe
-
Size
943KB
-
MD5
50d75122c586127e27b5507e760c4c0b
-
SHA1
9bdf707bf876d344c92b96e78417bd72da8c27f7
-
SHA256
9b7751bd8aec8d094acc4fc832b843bd452711004418002e02fb5d57373dd686
-
SHA512
1341f97ada0e9c3280c1057d68c059624a9ca8e0dcbaa44e0c4b87f4acca99f93a97407584c1068ef5c73e5ee68a784cbfb2aa39e907dab04c508a5e9f4b8f0a
-
SSDEEP
6144:aXCADuBaYCeqtuorJG6QRqMyog3RU1A2yyERrqXsk:aXCADuBaKqk9XORU1A9dqXB
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1532-53-0x00000000000B0000-0x000000000019E000-memory.dmp family_redline -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/1532-53-0x00000000000B0000-0x000000000019E000-memory.dmp net_reactor -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Setup 2.1.exepid Process 1532 Setup 2.1.exe 1532 Setup 2.1.exe 1532 Setup 2.1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Setup 2.1.exedescription pid Process Token: SeDebugPrivilege 1532 Setup 2.1.exe