Analysis

  • max time kernel
    122s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    22-07-2021 07:19

General

  • Target

    mixazed_20210722-085032.exe

  • Size

    1.1MB

  • MD5

    ff6f0a35a5c1198e8b0f72822acf90c0

  • SHA1

    1a26b1307b1a9c4ca699eeffe316ca5ee696b4bd

  • SHA256

    5d3c164a69533582e2fcaaf4d39165a1eeba9c63d1b4a81971e5f2f7ab19513a

  • SHA512

    c1f4469570c7b2a899615a9099f5eecdc284d879d26b11ab599e76257c2c7e823c01d64fb864588ecd98ab2ef610cd3d34a2f4c2e1ccf2378bfdbe49568654b8

Malware Config

Extracted

Family

redline

Botnet

Nerino 10k

C2

salanoajalio.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mixazed_20210722-085032.exe
    "C:\Users\Admin\AppData\Local\Temp\mixazed_20210722-085032.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cmd < Turbamento.vstm
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^hNdVJZVWpvpxZESWIqQkxENNmvhdviIwPmhAAYtASQCtHpazVhBEhjrIZCvjLFmeNiFmsacJWdzDeJufrUcpGrODcFAXCROhdAdAETeDRSHXSmGf$" Dall.vstm
          4⤵
            PID:1720
          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com
            Riflettere.exe.com e
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1796
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com
              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com e
              5⤵
              • Executes dropped EXE
              • Drops startup file
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1576
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1760
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 30
            4⤵
            • Runs ping.exe
            PID:1688
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
        2⤵
        • Deletes itself
        PID:480

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd
      MD5

      57db6339bf01bb586eb9df30a4b2c5cd

      SHA1

      9423ef97b4ec1d231a06b85deaf7ed6c732f7677

      SHA256

      37fbea0447bf4aba5e2b0b2c3ab59fe99b2c4dbfe3dc12a6904d8658fba143da

      SHA512

      530b25f920e682c99c93f4ae2b8fb8c0dc30539c64432f6b7039bd05963df49606ea3a6f60f13f924de877e9f4e9f6b364c25687bf3b1820b5ed8760e00cea08

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Dall.vstm
      MD5

      6b13e966110ee6e64ccb974759bcbb9c

      SHA1

      b16222d128e4ddbdf3d7e186b44d411c16ea592c

      SHA256

      6ba1cae5717e6842405f1ba06661c9df37ca5a79ae7d9fa35459fe38f6e65af2

      SHA512

      51ada73bf7f81a87b71d3e772f195ed91cdf992ece565213bcc4504d08cad6dc8db8ea3b844dbbb534236d82a095f5c85ea6dc5a3d40f468fa324575ecb39de7

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Mantenga.vstm
      MD5

      1d909c5d5af918d424db0cd799ddfbc1

      SHA1

      32a190c07db8573e7e393c3e358f148a755944f1

      SHA256

      19c779f7cc2972c2b4baa8e67142d71dbc14da72c5855ab1d035babb59f082b8

      SHA512

      9937dfc59a83a2a3d08138a97a2c5e9707a63a11c9f99afd8dd699538b78cb97396c58271bd3303a83eae8808f0ddbaece303fa39f67013289e4a2d04167ffdd

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puo.vstm
      MD5

      979131f1f9a50d2ecb059c6078b188af

      SHA1

      18a535e0b35dddb22d9242553491eb909d77f46c

      SHA256

      0acdedd5b3469a6372d76de6de9435e38a098ef157453728b5090baf7228361d

      SHA512

      c3677e96345ce5da150bebcb54a508bfc814cc1c2d688a024318aa24d060e764dfd8338694e4cfef8580359bdb021e3130feb26f5faa92a4efc6ab072d07af56

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Turbamento.vstm
      MD5

      d01168146bbd77f8d20ae7cb2eea7e25

      SHA1

      5d7d4727c4e9d1d6e4ce66f370f37cbf78c5d61c

      SHA256

      d54ce92e200a2e181865bc5c26dcef24d2f95bd47fa03c893ea6fcc91e761093

      SHA512

      a37d5d1b2d77a4d6b49baf50f82926be3bdf82a5061bc488e07aefd4d171ee274b7091d7b37bd25959b771712d7768ead80b071b63f1bd6ef7825e643336fdf8

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\e
      MD5

      1d909c5d5af918d424db0cd799ddfbc1

      SHA1

      32a190c07db8573e7e393c3e358f148a755944f1

      SHA256

      19c779f7cc2972c2b4baa8e67142d71dbc14da72c5855ab1d035babb59f082b8

      SHA512

      9937dfc59a83a2a3d08138a97a2c5e9707a63a11c9f99afd8dd699538b78cb97396c58271bd3303a83eae8808f0ddbaece303fa39f67013289e4a2d04167ffdd

    • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riflettere.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/480-89-0x0000000000000000-mapping.dmp
    • memory/1540-63-0x0000000000000000-mapping.dmp
    • memory/1576-75-0x0000000000000000-mapping.dmp
    • memory/1576-80-0x0000000000160000-0x0000000000161000-memory.dmp
      Filesize

      4KB

    • memory/1688-70-0x0000000000000000-mapping.dmp
    • memory/1720-64-0x0000000000000000-mapping.dmp
    • memory/1760-81-0x0000000000090000-0x00000000000AE000-memory.dmp
      Filesize

      120KB

    • memory/1760-86-0x0000000000090000-0x00000000000AE000-memory.dmp
      Filesize

      120KB

    • memory/1760-88-0x0000000005060000-0x0000000005061000-memory.dmp
      Filesize

      4KB

    • memory/1796-68-0x0000000000000000-mapping.dmp
    • memory/1920-60-0x0000000076691000-0x0000000076693000-memory.dmp
      Filesize

      8KB

    • memory/1992-61-0x0000000000000000-mapping.dmp