Overview
overview
10Static
static
10Mr4X5srRQR...AN.exe
windows10_x64
10OEmxRS9Uai...jI.exe
windows10_x64
10OvVYhhgvd6...oB.exe
windows10_x64
9QKvpJeDIaP...YY.exe
windows10_x64
9QwnNK2SHck...xe.xml
windows10_x64
1QxZsdXOO8X...jN.exe
windows10_x64
10QzUu4XgUxQ...C3.exe
windows10_x64
10SHSPDO6BYD...j9.exe
windows10_x64
10SqCuVl85T1...Di.exe
windows10_x64
10T8Ulrjj8F6..._x.exe
windows10_x64
10Trj0QcTNVE...S9.exe
windows10_x64
10Uwc7l02Hzj...tU.exe
windows10_x64
6VoTrXaqIJ3...LW.exe
windows10_x64
10Wp77te7Dqj...Hr.exe
windows10_x64
9XOCYAkm_Nn...Q3.exe
windows10_x64
9Xd_XnNqsZT...Ai.exe
windows10_x64
10Xr9ca9oQNQ...Z9.exe
windows10_x64
9XukfUfK8HA...FI.exe
windows10_x64
8YPTXDeqMC1...ns.exe
windows10_x64
8ma_5nZD3yo...xT.exe
windows10_x64
10pnDF_dk604...fi.exe
windows10_x64
10q_TzaanAkp...91.exe
windows10_x64
9rgVakr0Eru...xw.exe
windows10_x64
10t1fkwFYUEZ...r4.exe
windows10_x64
10tC6gdsFTgl...3x.exe
windows10_x64
10tGeiUalbSc...xe.xml
windows10_x64
1uMWmES83od...kJ.exe
windows10_x64
10v5n1HuUxta...Iu.exe
windows10_x64
10wTzxLyAQL7...bA.exe
windows10_x64
6xiGD01oEkh...VJ.exe
windows10_x64
10yBqNUgvOW6...Fb.exe
windows10_x64
10Analysis
-
max time kernel
302s -
max time network
307s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-08-2021 20:55
Behavioral task
behavioral1
Sample
Mr4X5srRQR20TfuVZShfsrAN.exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
OEmxRS9UaiMPqIKXPz6Ef8jI.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
OvVYhhgvd6ZhUony5cRMqVoB.exe
Resource
win10v20210410
Behavioral task
behavioral4
Sample
QKvpJeDIaPtXDcwKwH_WmAYY.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
QwnNK2SHckcc_GsoTwi8hDi5.exe.xml
Resource
win10v20210410
Behavioral task
behavioral6
Sample
QxZsdXOO8Xn2bW7iW8ff3gjN.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
QzUu4XgUxQuvhFNx7Nf5D6C3.exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
SHSPDO6BYDV7xlwsZDJxsLj9.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
SqCuVl85T1P8OuH3gpVMKnDi.exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
T8Ulrjj8F65YXJ2qZEm11v_x.exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Trj0QcTNVE3l8SBp_3LNLFS9.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
Uwc7l02HzjEVLDdBFF3ZKItU.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
VoTrXaqIJ3vc2GnUIU6Wi5LW.exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Wp77te7DqjxTjTIGMDSB0RHr.exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
XOCYAkm_NnnfPmgVDNgu9MQ3.exe
Resource
win10v20210410
Behavioral task
behavioral16
Sample
Xd_XnNqsZTJJf8dCq4s_mlAi.exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Xr9ca9oQNQWbUwEgChRmX6Z9.exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
XukfUfK8HAbjc5wMknHwOhFI.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
YPTXDeqMC118ip3zHbyxwlns.exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
ma_5nZD3yos0uV8jzHnJSVxT.exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
pnDF_dk604_fxVsUaLPL1Vfi.exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
q_TzaanAkp60Doa2Vt025l91.exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
rgVakr0EruC2FtauFmrgXkxw.exe
Resource
win10v20210408
Behavioral task
behavioral24
Sample
t1fkwFYUEZVXvf_7oFFpVnr4.exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
tC6gdsFTgl9CBMrK_2QhZX3x.exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
tGeiUalbScQ8sPK2KKmKZNga.exe.xml
Resource
win10v20210410
Behavioral task
behavioral27
Sample
uMWmES83oduRUCtOU5jzfQkJ.exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
v5n1HuUxtaYNHT7sRlXCCwIu.exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
wTzxLyAQL7H5FI0GIaor5FbA.exe
Resource
win10v20210410
Behavioral task
behavioral30
Sample
xiGD01oEkhh5s50F0Mw8lPVJ.exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
yBqNUgvOW6iDky2dKdBCi5Fb.exe
Resource
win10v20210410
General
-
Target
OEmxRS9UaiMPqIKXPz6Ef8jI.exe
-
Size
589KB
-
MD5
34c76bcc1506b513c7a1ac605c045c4e
-
SHA1
271c6b3853e33e039242da7cf8f4465c48e90d2e
-
SHA256
1e7f2339065e8a6909eea27f090499a1af6427d1563ceac0cd25c916c637d29d
-
SHA512
cb2170b5fa492dcb7df54cfd7f4ad94214de98face0f1710cbad749c79bf322ea1106ace723520486bdeabdf0aa2eefbf70dcc060d61fcda1124298225c36865
Malware Config
Extracted
redline
23.08
95.181.172.100:55640
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2840-120-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/2840-121-0x000000000041A772-mapping.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
OEmxRS9UaiMPqIKXPz6Ef8jI.exedescription pid process target process PID 2232 set thread context of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
OEmxRS9UaiMPqIKXPz6Ef8jI.exepid process 2840 OEmxRS9UaiMPqIKXPz6Ef8jI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
OEmxRS9UaiMPqIKXPz6Ef8jI.exedescription pid process Token: SeDebugPrivilege 2840 OEmxRS9UaiMPqIKXPz6Ef8jI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
OEmxRS9UaiMPqIKXPz6Ef8jI.exedescription pid process target process PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe PID 2232 wrote to memory of 2840 2232 OEmxRS9UaiMPqIKXPz6Ef8jI.exe OEmxRS9UaiMPqIKXPz6Ef8jI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OEmxRS9UaiMPqIKXPz6Ef8jI.exe"C:\Users\Admin\AppData\Local\Temp\OEmxRS9UaiMPqIKXPz6Ef8jI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\OEmxRS9UaiMPqIKXPz6Ef8jI.exeC:\Users\Admin\AppData\Local\Temp\OEmxRS9UaiMPqIKXPz6Ef8jI.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034