Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
85458E2A887CC0C8E082371361E93E71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85458E2A887CC0C8E082371361E93E71.exe
Resource
win10v2004-20231215-en
General
-
Target
85458E2A887CC0C8E082371361E93E71.exe
-
Size
441KB
-
MD5
85458e2a887cc0c8e082371361e93e71
-
SHA1
32586983cdaaa1bb3b9f96aabe1b20b4d5395b54
-
SHA256
b919be4df2b321304c804b9af68e6c5da6c03a821381c30cfc2d9d0fb042e0d1
-
SHA512
c884f6b158088ce0af94d07cacff03aff838fdf7835a8d42cbfc96114cb3261a1b4e83ccf7fb8cafa98ef2debe8a2792379dee01845434548bd8af713dc99210
-
SSDEEP
6144:12nNl+qEPUFD7x7OxXZaULYkgg8VeZcLYPob/bZEa97a98:1eNl+iDwZaLkswiY9a97a98
Malware Config
Extracted
redline
79.137.203.183:36235
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2712-0-0x0000000000230000-0x0000000000284000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2712 85458E2A887CC0C8E082371361E93E71.exe 2712 85458E2A887CC0C8E082371361E93E71.exe 2712 85458E2A887CC0C8E082371361E93E71.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 85458E2A887CC0C8E082371361E93E71.exe