Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2023 01:47
Static task
static1
Behavioral task
behavioral1
Sample
f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe
Resource
win10v2004-20230831-en
General
-
Target
f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe
-
Size
262KB
-
MD5
bf1807ec443b76a12ad675f7cb6bf23a
-
SHA1
d6eeec1c8cc1ac59d65c778cd66ea4084d633401
-
SHA256
f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd
-
SHA512
d50a035ce07479a7517dd4571fbfd9ee292e55ca64eab708dc45882b708a77f27c9c5889e4b95a5e8555c316f7ec72be6e16c5d2747fcd201d61c494753437f1
-
SSDEEP
3072:zxWXLSyBIbiyAeqwcBbGgabMMy1AxH/HLf/Ji49WCoMY5Z+:zxWzbhdBbGgabvy1AeemZ+
Malware Config
Extracted
redline
91.103.252.3:48665
-
auth_value
c941e5a9c764e0b2f0217e4f4c758e7a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe 4824 f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe 4824 f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe 4824 f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4824 f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe"C:\Users\Admin\AppData\Local\Temp\f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824