Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
66561bb14913a1cd899dc375baedc0c1.bin.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66561bb14913a1cd899dc375baedc0c1.bin.exe
Resource
win10v2004-20231222-en
General
-
Target
66561bb14913a1cd899dc375baedc0c1.bin.exe
-
Size
514KB
-
MD5
66561bb14913a1cd899dc375baedc0c1
-
SHA1
281c6863850a9153481aff043ea8be11ac50a451
-
SHA256
4c6b2a92796f1b86ef518b1af829c22c319471f2bc4b119f6b6ead9607d6e7dc
-
SHA512
6e7066bc6c04f6f4729f4ad728a905c9d8287ce692669a0b3764a5e297d1006b63d3af725a854a9880d275c2a1e6d5b8a72f71268d3597c384948d93425807f7
-
SSDEEP
12288:i0Nutyq5ViplmKWKpzfrxTL+R/lqW5OMy:n0ribTWKpzfrZS2W5
Malware Config
Extracted
redline
167.235.64.195:31839
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1236-6-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4484 set thread context of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1236 66561bb14913a1cd899dc375baedc0c1.bin.exe 1236 66561bb14913a1cd899dc375baedc0c1.bin.exe 1236 66561bb14913a1cd899dc375baedc0c1.bin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe Token: SeDebugPrivilege 1236 66561bb14913a1cd899dc375baedc0c1.bin.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89 PID 4484 wrote to memory of 1236 4484 66561bb14913a1cd899dc375baedc0c1.bin.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\66561bb14913a1cd899dc375baedc0c1.bin.exe"C:\Users\Admin\AppData\Local\Temp\66561bb14913a1cd899dc375baedc0c1.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\66561bb14913a1cd899dc375baedc0c1.bin.exeC:\Users\Admin\AppData\Local\Temp\66561bb14913a1cd899dc375baedc0c1.bin.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-