Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-11-2021 16:48
Static task
static1
Behavioral task
behavioral1
Sample
45c7d66ca1987d417e1858b7b353b758.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
45c7d66ca1987d417e1858b7b353b758.exe
Resource
win10-en-20211014
General
-
Target
45c7d66ca1987d417e1858b7b353b758.exe
-
Size
1.6MB
-
MD5
45c7d66ca1987d417e1858b7b353b758
-
SHA1
ed09b156cfd87ec42f620721a35bf27392bb8c1a
-
SHA256
2bd4ae02afd897b27640f8b3286928043845cefad1ca97ca7ed2b859b0e4b984
-
SHA512
43228a7f672b0c8ba0dbea43d15aae761efbb02dd24e2955f8350fd3db92334ff2c9a2d78857266ae92a45e7330b810d514084e2573a731f8e5dbb10edaebedd
Malware Config
Extracted
redline
Firefox
194.127.179.0:42417
Extracted
redline
Error
129.146.249.128:64466
Extracted
raccoon
1.8.3-hotfix
c5dde00a0ce162508bf7358fade224b1c1bd5f5f
-
url4cnc
http://91.219.236.27/zondaf1zuzya
http://5.181.156.92/zondaf1zuzya
http://91.219.236.207/zondaf1zuzya
http://185.225.19.18/zondaf1zuzya
http://91.219.237.227/zondaf1zuzya
http://185.163.47.176/zondaf1zuzya
https://t.me/zondaf1zuzya
Extracted
redline
Reklyn
185.92.74.98:11734
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1984-143-0x00000000064C0000-0x0000000006528000-memory.dmp family_redline behavioral2/memory/1984-145-0x0000000006A30000-0x0000000006A96000-memory.dmp family_redline behavioral2/memory/2632-157-0x0000000003AD0000-0x0000000003AFE000-memory.dmp family_redline behavioral2/memory/2632-159-0x00000000062C0000-0x00000000062EC000-memory.dmp family_redline behavioral2/memory/1220-197-0x0000000000400000-0x0000000000424000-memory.dmp family_redline behavioral2/memory/1220-198-0x0000000000418F3A-mapping.dmp family_redline -
Executes dropped EXE 8 IoCs
Processes:
1616.exeFinderFile_2021-11-25_16-07.exeNortonSecurity.exeQfseWnwbRox1BnG.exe1616.exe1616.exeQfseWnwbRox1BnG.exeQfseWnwbRox1BnG.exepid process 1300 1616.exe 2632 FinderFile_2021-11-25_16-07.exe 1984 NortonSecurity.exe 652 QfseWnwbRox1BnG.exe 1788 1616.exe 1772 1616.exe 2088 QfseWnwbRox1BnG.exe 1220 QfseWnwbRox1BnG.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
1616.exeQfseWnwbRox1BnG.exedescription pid process target process PID 1300 set thread context of 1772 1300 1616.exe 1616.exe PID 652 set thread context of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
1616.exeNortonSecurity.exeFinderFile_2021-11-25_16-07.exeQfseWnwbRox1BnG.exeQfseWnwbRox1BnG.exepid process 1300 1616.exe 1300 1616.exe 1300 1616.exe 1300 1616.exe 1300 1616.exe 1300 1616.exe 1984 NortonSecurity.exe 2632 FinderFile_2021-11-25_16-07.exe 652 QfseWnwbRox1BnG.exe 652 QfseWnwbRox1BnG.exe 1220 QfseWnwbRox1BnG.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
1616.exeNortonSecurity.exeFinderFile_2021-11-25_16-07.exeQfseWnwbRox1BnG.exeQfseWnwbRox1BnG.exedescription pid process Token: SeDebugPrivilege 1300 1616.exe Token: SeDebugPrivilege 1984 NortonSecurity.exe Token: SeDebugPrivilege 2632 FinderFile_2021-11-25_16-07.exe Token: SeDebugPrivilege 652 QfseWnwbRox1BnG.exe Token: SeDebugPrivilege 1220 QfseWnwbRox1BnG.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
45c7d66ca1987d417e1858b7b353b758.exe1616.exeQfseWnwbRox1BnG.exedescription pid process target process PID 2996 wrote to memory of 1300 2996 45c7d66ca1987d417e1858b7b353b758.exe 1616.exe PID 2996 wrote to memory of 1300 2996 45c7d66ca1987d417e1858b7b353b758.exe 1616.exe PID 2996 wrote to memory of 1300 2996 45c7d66ca1987d417e1858b7b353b758.exe 1616.exe PID 2996 wrote to memory of 2632 2996 45c7d66ca1987d417e1858b7b353b758.exe FinderFile_2021-11-25_16-07.exe PID 2996 wrote to memory of 2632 2996 45c7d66ca1987d417e1858b7b353b758.exe FinderFile_2021-11-25_16-07.exe PID 2996 wrote to memory of 2632 2996 45c7d66ca1987d417e1858b7b353b758.exe FinderFile_2021-11-25_16-07.exe PID 2996 wrote to memory of 1984 2996 45c7d66ca1987d417e1858b7b353b758.exe NortonSecurity.exe PID 2996 wrote to memory of 1984 2996 45c7d66ca1987d417e1858b7b353b758.exe NortonSecurity.exe PID 2996 wrote to memory of 1984 2996 45c7d66ca1987d417e1858b7b353b758.exe NortonSecurity.exe PID 2996 wrote to memory of 652 2996 45c7d66ca1987d417e1858b7b353b758.exe QfseWnwbRox1BnG.exe PID 2996 wrote to memory of 652 2996 45c7d66ca1987d417e1858b7b353b758.exe QfseWnwbRox1BnG.exe PID 2996 wrote to memory of 652 2996 45c7d66ca1987d417e1858b7b353b758.exe QfseWnwbRox1BnG.exe PID 1300 wrote to memory of 1788 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1788 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1788 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 1300 wrote to memory of 1772 1300 1616.exe 1616.exe PID 652 wrote to memory of 2088 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 2088 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 2088 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe PID 652 wrote to memory of 1220 652 QfseWnwbRox1BnG.exe QfseWnwbRox1BnG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c7d66ca1987d417e1858b7b353b758.exe"C:\Users\Admin\AppData\Local\Temp\45c7d66ca1987d417e1858b7b353b758.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1616.exe"C:\Users\Admin\AppData\Local\Temp\1616.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1616.exeC:\Users\Admin\AppData\Local\Temp\1616.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1616.exeC:\Users\Admin\AppData\Local\Temp\1616.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FinderFile_2021-11-25_16-07.exe"C:\Users\Admin\AppData\Local\Temp\FinderFile_2021-11-25_16-07.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\NortonSecurity.exe"C:\Users\Admin\AppData\Local\Temp\NortonSecurity.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exe"C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exe"{path}"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QfseWnwbRox1BnG.exe.logMD5
90acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
C:\Users\Admin\AppData\Local\Temp\1616.exeMD5
78cb0c6298d5b2b2193578c8cb7bfa36
SHA1540c1fd6c55179d19afbb806a4eb565407b08589
SHA256a9aca7ba092ed61929359feca0276dfaa50568cdffd375f828033160f5e70166
SHA5121a16f77ca94df210c478d45acd604be9442902b7b3477285cb152a4cb9516f1f4ab6dcaeb48a9bd1d2f21967927fa121001020865321d61e1ac79f44e2aa75b9
-
C:\Users\Admin\AppData\Local\Temp\1616.exeMD5
78cb0c6298d5b2b2193578c8cb7bfa36
SHA1540c1fd6c55179d19afbb806a4eb565407b08589
SHA256a9aca7ba092ed61929359feca0276dfaa50568cdffd375f828033160f5e70166
SHA5121a16f77ca94df210c478d45acd604be9442902b7b3477285cb152a4cb9516f1f4ab6dcaeb48a9bd1d2f21967927fa121001020865321d61e1ac79f44e2aa75b9
-
C:\Users\Admin\AppData\Local\Temp\1616.exeMD5
78cb0c6298d5b2b2193578c8cb7bfa36
SHA1540c1fd6c55179d19afbb806a4eb565407b08589
SHA256a9aca7ba092ed61929359feca0276dfaa50568cdffd375f828033160f5e70166
SHA5121a16f77ca94df210c478d45acd604be9442902b7b3477285cb152a4cb9516f1f4ab6dcaeb48a9bd1d2f21967927fa121001020865321d61e1ac79f44e2aa75b9
-
C:\Users\Admin\AppData\Local\Temp\1616.exeMD5
78cb0c6298d5b2b2193578c8cb7bfa36
SHA1540c1fd6c55179d19afbb806a4eb565407b08589
SHA256a9aca7ba092ed61929359feca0276dfaa50568cdffd375f828033160f5e70166
SHA5121a16f77ca94df210c478d45acd604be9442902b7b3477285cb152a4cb9516f1f4ab6dcaeb48a9bd1d2f21967927fa121001020865321d61e1ac79f44e2aa75b9
-
C:\Users\Admin\AppData\Local\Temp\FinderFile_2021-11-25_16-07.exeMD5
c1f611aca5584cc1cb2e3369309a5bbd
SHA1ba6d374028b33c34c680b730fa1a9467e637c691
SHA2568e3db645afe2742f3348020fc0ebc9cfdbd8f877271503a99aa87cb0a70b85f5
SHA51260dd43e16f68837b4cdce87285560c8423639041dd5e51a749534f23961c9dcb0dd06a81d30db02041caf37c7049e1c540083acb21fbf793bb19512ca2041f1c
-
C:\Users\Admin\AppData\Local\Temp\FinderFile_2021-11-25_16-07.exeMD5
c1f611aca5584cc1cb2e3369309a5bbd
SHA1ba6d374028b33c34c680b730fa1a9467e637c691
SHA2568e3db645afe2742f3348020fc0ebc9cfdbd8f877271503a99aa87cb0a70b85f5
SHA51260dd43e16f68837b4cdce87285560c8423639041dd5e51a749534f23961c9dcb0dd06a81d30db02041caf37c7049e1c540083acb21fbf793bb19512ca2041f1c
-
C:\Users\Admin\AppData\Local\Temp\NortonSecurity.exeMD5
81ba77bb6eccd0ec2fc8a1c05545a87f
SHA1c4b1fa59ce0509056630041b804898c11095865c
SHA25602347fa8becd91016d567f3ba5008b6325c14a33c0c80d2505817e1a23af4955
SHA5127105a94f83e28b08cbec78afcfbb5559e09c71836494d2807516ee3b61ad2820d764b52adc872fab26d66100f361dc5db16abb57ec71449e8abd531170305ca0
-
C:\Users\Admin\AppData\Local\Temp\NortonSecurity.exeMD5
81ba77bb6eccd0ec2fc8a1c05545a87f
SHA1c4b1fa59ce0509056630041b804898c11095865c
SHA25602347fa8becd91016d567f3ba5008b6325c14a33c0c80d2505817e1a23af4955
SHA5127105a94f83e28b08cbec78afcfbb5559e09c71836494d2807516ee3b61ad2820d764b52adc872fab26d66100f361dc5db16abb57ec71449e8abd531170305ca0
-
C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exeMD5
fedec493e939b53057ca0525eb308505
SHA1e12dc7d015101a686a3446a7dd7e8db0947d1629
SHA256f089b142b58e29b36a3e01c0629637f17df554c25c40c2ecfa790cf4a9c0953b
SHA51260d65da576f250ccea4be37c0f45f696ca0e1865ad0ebb44ead7cf2e898990093c8205e86d58b7ac0f2ba83956b73fbb541a2df4e71f96236b719ad53c52ff1e
-
C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exeMD5
fedec493e939b53057ca0525eb308505
SHA1e12dc7d015101a686a3446a7dd7e8db0947d1629
SHA256f089b142b58e29b36a3e01c0629637f17df554c25c40c2ecfa790cf4a9c0953b
SHA51260d65da576f250ccea4be37c0f45f696ca0e1865ad0ebb44ead7cf2e898990093c8205e86d58b7ac0f2ba83956b73fbb541a2df4e71f96236b719ad53c52ff1e
-
C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exeMD5
fedec493e939b53057ca0525eb308505
SHA1e12dc7d015101a686a3446a7dd7e8db0947d1629
SHA256f089b142b58e29b36a3e01c0629637f17df554c25c40c2ecfa790cf4a9c0953b
SHA51260d65da576f250ccea4be37c0f45f696ca0e1865ad0ebb44ead7cf2e898990093c8205e86d58b7ac0f2ba83956b73fbb541a2df4e71f96236b719ad53c52ff1e
-
C:\Users\Admin\AppData\Local\Temp\QfseWnwbRox1BnG.exeMD5
fedec493e939b53057ca0525eb308505
SHA1e12dc7d015101a686a3446a7dd7e8db0947d1629
SHA256f089b142b58e29b36a3e01c0629637f17df554c25c40c2ecfa790cf4a9c0953b
SHA51260d65da576f250ccea4be37c0f45f696ca0e1865ad0ebb44ead7cf2e898990093c8205e86d58b7ac0f2ba83956b73fbb541a2df4e71f96236b719ad53c52ff1e
-
memory/652-195-0x0000000009B40000-0x0000000009B5F000-memory.dmpFilesize
124KB
-
memory/652-135-0x0000000005260000-0x0000000005261000-memory.dmpFilesize
4KB
-
memory/652-125-0x0000000000000000-mapping.dmp
-
memory/652-194-0x0000000009980000-0x00000000099EC000-memory.dmpFilesize
432KB
-
memory/652-130-0x0000000000840000-0x0000000000841000-memory.dmpFilesize
4KB
-
memory/652-134-0x00000000056C0000-0x00000000056C1000-memory.dmpFilesize
4KB
-
memory/652-137-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/652-138-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/652-139-0x00000000051C0000-0x00000000056BE000-memory.dmpFilesize
5.0MB
-
memory/652-140-0x00000000056B0000-0x00000000056B5000-memory.dmpFilesize
20KB
-
memory/652-133-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/1220-197-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1220-206-0x00000000076E0000-0x00000000076E1000-memory.dmpFilesize
4KB
-
memory/1220-198-0x0000000000418F3A-mapping.dmp
-
memory/1220-208-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/1300-129-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/1300-136-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/1300-171-0x00000000061E0000-0x0000000006271000-memory.dmpFilesize
580KB
-
memory/1300-117-0x0000000000000000-mapping.dmp
-
memory/1300-174-0x0000000006670000-0x00000000066C6000-memory.dmpFilesize
344KB
-
memory/1300-172-0x0000000006350000-0x0000000006351000-memory.dmpFilesize
4KB
-
memory/1772-176-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1772-177-0x000000000043F176-mapping.dmp
-
memory/1772-179-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1984-192-0x000000000A110000-0x000000000A111000-memory.dmpFilesize
4KB
-
memory/1984-147-0x0000000007230000-0x0000000007231000-memory.dmpFilesize
4KB
-
memory/1984-121-0x0000000000000000-mapping.dmp
-
memory/1984-142-0x0000000003A80000-0x0000000003B1C000-memory.dmpFilesize
624KB
-
memory/1984-183-0x0000000009150000-0x0000000009151000-memory.dmpFilesize
4KB
-
memory/1984-143-0x00000000064C0000-0x0000000006528000-memory.dmpFilesize
416KB
-
memory/1984-145-0x0000000006A30000-0x0000000006A96000-memory.dmpFilesize
408KB
-
memory/1984-154-0x0000000003E62000-0x0000000003E63000-memory.dmpFilesize
4KB
-
memory/1984-155-0x00000000073B0000-0x00000000073B1000-memory.dmpFilesize
4KB
-
memory/1984-146-0x0000000006BA0000-0x0000000006BA1000-memory.dmpFilesize
4KB
-
memory/1984-152-0x0000000003E60000-0x0000000003E61000-memory.dmpFilesize
4KB
-
memory/1984-160-0x00000000089D0000-0x00000000089D1000-memory.dmpFilesize
4KB
-
memory/1984-148-0x0000000007260000-0x0000000007261000-memory.dmpFilesize
4KB
-
memory/1984-151-0x0000000003E64000-0x0000000003E66000-memory.dmpFilesize
8KB
-
memory/1984-149-0x0000000000400000-0x0000000001C6E000-memory.dmpFilesize
24.4MB
-
memory/1984-156-0x0000000003E63000-0x0000000003E64000-memory.dmpFilesize
4KB
-
memory/1984-189-0x0000000009AF0000-0x0000000009AF1000-memory.dmpFilesize
4KB
-
memory/1984-188-0x0000000009920000-0x0000000009921000-memory.dmpFilesize
4KB
-
memory/2632-168-0x0000000006462000-0x0000000006463000-memory.dmpFilesize
4KB
-
memory/2632-166-0x0000000000400000-0x0000000001C1B000-memory.dmpFilesize
24.1MB
-
memory/2632-159-0x00000000062C0000-0x00000000062EC000-memory.dmpFilesize
176KB
-
memory/2632-186-0x0000000009520000-0x0000000009521000-memory.dmpFilesize
4KB
-
memory/2632-153-0x0000000003960000-0x0000000003999000-memory.dmpFilesize
228KB
-
memory/2632-170-0x0000000006464000-0x0000000006466000-memory.dmpFilesize
8KB
-
memory/2632-169-0x0000000006463000-0x0000000006464000-memory.dmpFilesize
4KB
-
memory/2632-167-0x0000000006460000-0x0000000006461000-memory.dmpFilesize
4KB
-
memory/2632-157-0x0000000003AD0000-0x0000000003AFE000-memory.dmpFilesize
184KB
-
memory/2632-119-0x0000000000000000-mapping.dmp
-
memory/2996-115-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB