Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240226-en
General
-
Target
file.exe
-
Size
949KB
-
MD5
50852c736bd257b42873d2fed301c2c6
-
SHA1
4ade3409bdab741a140fbb3062323cf08dbbe727
-
SHA256
0e34e71619203992822a17c00c51b0599073dbc458253f45dcafae2b9202e843
-
SHA512
0e041b0e3b17bfd5241f2dcc73e4e034ac03cc2537636d938f3d2d33f83fd1848313aa8e3255cac3ab6a4eaeddc60e0134cfd27bfc06873978f5839fdf7841e8
-
SSDEEP
12288:pIYZ7w8sB1wIIQp9lGT6RYGoc7wIPWGJ1R4vsG1t7fPPjIepcsH/JDz:pIYZUnBMmDGT6RWc7w3GfqEE788H/J
Malware Config
Extracted
redline
5395192397_99
https://pastebin.com/raw/8baCJyMF
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/392-0-0x0000000001420000-0x0000000001442000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 pastebin.com 11 pastebin.com -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe 392 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 392 file.exe