Analysis
-
max time kernel
127s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
15-08-2023 07:22
Static task
static1
Behavioral task
behavioral1
Sample
ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe
Resource
win10-20230703-en
General
-
Target
ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe
-
Size
338KB
-
MD5
746ca5e3ab02b0777bdcad33297090f0
-
SHA1
73a326fcfc65cb4ad7e870c55a75edf9f91e6fef
-
SHA256
ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22
-
SHA512
1c43a659e8acdf044d3f0d12fba194f640306e698e548aae1d0440cb03559aaba3b38a3bc001e2b9b2308bffa3264898924e66e624a9f28baefc5691790dcd38
-
SSDEEP
6144:OQmnGLItTwgqyd3paDu7pu+I47WeaBZQRmYaIJddg:O/GctT3d3p97pS/eaLADaIJI
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.83.170.21:19447
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 948 ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe 948 ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe 948 ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 948 ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe"C:\Users\Admin\AppData\Local\Temp\ea79ee028f9137297f4b4f42165658c0c60fd51a54e3df57361079e18cb42e22.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948