Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
General
-
Target
file.exe
-
Size
291KB
-
MD5
82dff01ab90a28a19048fe5cfbcbc895
-
SHA1
9006253561020584da11344f702ebb9d4ee7127d
-
SHA256
513cfd7c3b47cd8acb5b7f0e3365273a1cf6ee0a5f4635a35fb910e574d37d11
-
SHA512
e894769ca833df1ae11f6cfc5f5b1d89e649be7512ff8f9bed69bf740802c80e6523b1a1e1cd94bf2409e3d9af374aeb41ce3c8e849c10ccec1afc56527e680b
-
SSDEEP
6144:oIbH9up2Eidk1EO/D0YMOfn2rZ+FfidK1:Rb1dk1ZyK1
Malware Config
Extracted
redline
@oleh_ps
194.169.175.235:42691
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4560-0-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral2/memory/4560-1-0x00000000001C0000-0x00000000001FE000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4560 file.exe 4560 file.exe 4560 file.exe 4560 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4560 file.exe