Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-03-2024 14:25
Behavioral task
behavioral1
Sample
1584-71-0x0000000002290000-0x00000000022D4000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1584-71-0x0000000002290000-0x00000000022D4000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1584-71-0x0000000002290000-0x00000000022D4000-memory.exe
-
Size
272KB
-
MD5
225949307a53671e7903f1f570a680c7
-
SHA1
17c93dcf1f5e112cfd452273ae0c7f9758b0e9c3
-
SHA256
387aedc772705f0330463aa4b884e87967c1345f7cbc1b5c837a0ba0981a3d85
-
SHA512
1be29ca13b88e4148d98b17d749ae6e0dbc2042af0bbdb3a678e572ad49f1b3760c5d7ef66b79208afbf8ee2a24c145395863450a7842c4082b62643fe80b057
-
SSDEEP
3072:ow6jYELp6VFxC2lS2H0onEyGKH5miQo40s0CGzhF3lnI2gfxNn2pU9f2MKTV/wiv:ow6j+l8whnTGKZm4HzhrnI
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3056-0-0x0000000001290000-0x00000000012D4000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1584-71-0x0000000002290000-0x00000000022D4000-memory.exedescription pid process Token: SeDebugPrivilege 3056 1584-71-0x0000000002290000-0x00000000022D4000-memory.exe