Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    28/05/2021, 19:46 UTC

General

  • Target

    a3111c47c0b8cc5405b80e0fee672213.exe

  • Size

    815KB

  • MD5

    a3111c47c0b8cc5405b80e0fee672213

  • SHA1

    919e1912ade8b9891f6482fd1c2ded0b85361d0d

  • SHA256

    1d857a8ee0c9851c6ddcd0dcc0ac0057e772f152883762ffbf50457b6c463fd5

  • SHA512

    b3976e6e08602ae921c086a1246c46f5fc8a3fc93fefc72d01c75f50d13ec9d7b07f87981af504c9acef52f7b9cff6dbb33ef130398099a755adfddd5639e849

Malware Config

Extracted

Family

redline

Botnet

AdsCouponGeneratorV1.0.1

C2

194.233.74.11:35496

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3111c47c0b8cc5405b80e0fee672213.exe
    "C:\Users\Admin\AppData\Local\Temp\a3111c47c0b8cc5405b80e0fee672213.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a3111c47c0b8cc5405b80e0fee672213.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1800
    • C:\Users\Admin\AppData\Local\Temp\a3111c47c0b8cc5405b80e0fee672213.exe
      "C:\Users\Admin\AppData\Local\Temp\a3111c47c0b8cc5405b80e0fee672213.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4192

Network

  • flag-unknown
    POST
    http://194.233.74.11:35496//
    a3111c47c0b8cc5405b80e0fee672213.exe
    Remote address:
    194.233.74.11:35496
    Request
    POST // HTTP/1.1
    Content-Type: text/xml; charset=utf-8
    SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
    Host: 194.233.74.11:35496
    Content-Length: 137
    Expect: 100-continue
    Accept-Encoding: gzip, deflate
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Content-Length: 4769
    Content-Type: text/xml; charset=utf-8
    Server: Microsoft-HTTPAPI/2.0
    Date: Fri, 28 May 2021 13:48:12 GMT
  • flag-unknown
    POST
    http://194.233.74.11:35496//
    a3111c47c0b8cc5405b80e0fee672213.exe
    Remote address:
    194.233.74.11:35496
    Request
    POST // HTTP/1.1
    Content-Type: text/xml; charset=utf-8
    SOAPAction: "http://tempuri.org/Endpoint/VerifyScanRequest"
    Host: 194.233.74.11:35496
    Content-Length: 4009569
    Expect: 100-continue
    Accept-Encoding: gzip, deflate
    Response
    HTTP/1.1 200 OK
    Content-Length: 150
    Content-Type: text/xml; charset=utf-8
    Server: Microsoft-HTTPAPI/2.0
    Date: Fri, 28 May 2021 13:48:19 GMT
  • flag-unknown
    POST
    http://194.233.74.11:35496//
    a3111c47c0b8cc5405b80e0fee672213.exe
    Remote address:
    194.233.74.11:35496
    Request
    POST // HTTP/1.1
    Content-Type: text/xml; charset=utf-8
    SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
    Host: 194.233.74.11:35496
    Content-Length: 4009555
    Expect: 100-continue
    Accept-Encoding: gzip, deflate
    Response
    HTTP/1.1 200 OK
    Content-Length: 261
    Content-Type: text/xml; charset=utf-8
    Server: Microsoft-HTTPAPI/2.0
    Date: Fri, 28 May 2021 13:48:19 GMT
  • flag-unknown
    DNS
    api.ip.sb
    a3111c47c0b8cc5405b80e0fee672213.exe
    Remote address:
    8.8.8.8:53
    Request
    api.ip.sb
    IN A
    Response
    api.ip.sb
    IN CNAME
    api.ip.sb.cdn.cloudflare.net
    api.ip.sb.cdn.cloudflare.net
    IN A
    172.67.75.172
    api.ip.sb.cdn.cloudflare.net
    IN A
    104.26.12.31
    api.ip.sb.cdn.cloudflare.net
    IN A
    104.26.13.31
  • flag-unknown
    GET
    https://api.ip.sb/geoip
    a3111c47c0b8cc5405b80e0fee672213.exe
    Remote address:
    172.67.75.172:443
    Request
    GET /geoip HTTP/1.1
    Host: api.ip.sb
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Fri, 28 May 2021 19:48:10 GMT
    Content-Type: application/json; charset=utf-8
    Content-Length: 285
    Connection: keep-alive
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Cache-Control: no-cache
    Access-Control-Allow-Origin: *
    CF-Cache-Status: DYNAMIC
    cf-request-id: 0a561e27ff0000414aceb3e000000001
    Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=b3DlvxIkAJqh4ZD%2FaY27oPF2L9XV4f1WEjKYiHtP4xQox8A5%2B3efgfAEn33iZo5DyC%2B1JFOWziVhq1cGBCj8r4Iz3XYctoH9ozPeKyqKelXoCFs%2BSz8%3D"}],"group":"cf-nel","max_age":604800}
    NEL: {"report_to":"cf-nel","max_age":604800}
    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
    Server: cloudflare
    CF-RAY: 6569ffb99d67414a-HAM
  • 194.233.74.11:35496
    http://194.233.74.11:35496//
    http
    a3111c47c0b8cc5405b80e0fee672213.exe
    8.2MB
    56.5kB
    5503
    1269

    HTTP Request

    POST http://194.233.74.11:35496//

    HTTP Response

    200

    HTTP Request

    POST http://194.233.74.11:35496//

    HTTP Response

    200

    HTTP Request

    POST http://194.233.74.11:35496//

    HTTP Response

    200
  • 172.67.75.172:443
    https://api.ip.sb/geoip
    tls, http
    a3111c47c0b8cc5405b80e0fee672213.exe
    707 B
    4.1kB
    8
    8

    HTTP Request

    GET https://api.ip.sb/geoip

    HTTP Response

    200
  • 8.8.8.8:53
    api.ip.sb
    dns
    a3111c47c0b8cc5405b80e0fee672213.exe
    55 B
    145 B
    1
    1

    DNS Request

    api.ip.sb

    DNS Response

    172.67.75.172
    104.26.12.31
    104.26.13.31

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1800-168-0x00000000093F0000-0x00000000093F1000-memory.dmp

    Filesize

    4KB

  • memory/1800-144-0x0000000007FB0000-0x0000000007FB1000-memory.dmp

    Filesize

    4KB

  • memory/1800-169-0x0000000009550000-0x0000000009551000-memory.dmp

    Filesize

    4KB

  • memory/1800-137-0x0000000007A70000-0x0000000007A71000-memory.dmp

    Filesize

    4KB

  • memory/1800-163-0x0000000009010000-0x0000000009011000-memory.dmp

    Filesize

    4KB

  • memory/1800-156-0x0000000009030000-0x0000000009063000-memory.dmp

    Filesize

    204KB

  • memory/1800-148-0x0000000008320000-0x0000000008321000-memory.dmp

    Filesize

    4KB

  • memory/1800-143-0x0000000004902000-0x0000000004903000-memory.dmp

    Filesize

    4KB

  • memory/1800-186-0x0000000004903000-0x0000000004904000-memory.dmp

    Filesize

    4KB

  • memory/1800-142-0x0000000004900000-0x0000000004901000-memory.dmp

    Filesize

    4KB

  • memory/1800-185-0x000000007F710000-0x000000007F711000-memory.dmp

    Filesize

    4KB

  • memory/1800-132-0x00000000047A0000-0x00000000047A1000-memory.dmp

    Filesize

    4KB

  • memory/1800-133-0x00000000072D0000-0x00000000072D1000-memory.dmp

    Filesize

    4KB

  • memory/1800-140-0x0000000007B80000-0x0000000007B81000-memory.dmp

    Filesize

    4KB

  • memory/1800-139-0x0000000007B10000-0x0000000007B11000-memory.dmp

    Filesize

    4KB

  • memory/1800-138-0x0000000007AA0000-0x0000000007AA1000-memory.dmp

    Filesize

    4KB

  • memory/4192-135-0x0000000002F50000-0x0000000002F51000-memory.dmp

    Filesize

    4KB

  • memory/4192-147-0x00000000057B0000-0x00000000057B1000-memory.dmp

    Filesize

    4KB

  • memory/4192-136-0x0000000005500000-0x0000000005501000-memory.dmp

    Filesize

    4KB

  • memory/4192-134-0x0000000005B10000-0x0000000005B11000-memory.dmp

    Filesize

    4KB

  • memory/4192-141-0x0000000005540000-0x0000000005541000-memory.dmp

    Filesize

    4KB

  • memory/4192-125-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4192-145-0x0000000005500000-0x0000000005B06000-memory.dmp

    Filesize

    6.0MB

  • memory/4436-123-0x0000000008550000-0x00000000085AB000-memory.dmp

    Filesize

    364KB

  • memory/4436-114-0x0000000000A40000-0x0000000000A41000-memory.dmp

    Filesize

    4KB

  • memory/4436-122-0x0000000006010000-0x00000000060B1000-memory.dmp

    Filesize

    644KB

  • memory/4436-121-0x0000000005460000-0x000000000595E000-memory.dmp

    Filesize

    5.0MB

  • memory/4436-120-0x00000000053F0000-0x00000000053F5000-memory.dmp

    Filesize

    20KB

  • memory/4436-119-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

    Filesize

    4KB

  • memory/4436-118-0x0000000005500000-0x0000000005501000-memory.dmp

    Filesize

    4KB

  • memory/4436-117-0x0000000005460000-0x0000000005461000-memory.dmp

    Filesize

    4KB

  • memory/4436-116-0x0000000005960000-0x0000000005961000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.