Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 01:12
Static task
static1
Behavioral task
behavioral1
Sample
b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe
Resource
win10v2004-20220414-en
General
-
Target
b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe
-
Size
634KB
-
MD5
e8a57951fb4a981c29177e678a4d69e0
-
SHA1
9f088792cb02b9f31b57fe7a82f1a34e49c4c376
-
SHA256
b5c4acf55126207efb15b26683b7c0817b32717bb497622999413e54d26f04ce
-
SHA512
d62e6a4f5ca2addd81973002bc664b80dab664b444810110fba9062c20f77f68620d84dbacc30678bf25d85e6364aea7c1e63569225587d704f8631958fecc5a
Malware Config
Extracted
redline
mix15.04
185.215.113.70:12189
-
auth_value
7be339254ae826f7fe03de06dd444581
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1772 strongix.exe -
Loads dropped DLL 2 IoCs
pid Process 1180 b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe 1180 b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1772 strongix.exe 1772 strongix.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1772 strongix.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1772 1180 b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe 29 PID 1180 wrote to memory of 1772 1180 b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe 29 PID 1180 wrote to memory of 1772 1180 b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe 29 PID 1180 wrote to memory of 1772 1180 b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe"C:\Users\Admin\AppData\Local\Temp\b5c4acf55126207efb15b26683b7c0817b32717bb4976.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\shftool\strongix.exestrongix.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD56fe9416809f5da05b48bf86e1375e7be
SHA144ec2fa73a3e5ad6de01605815efedd324d2efca
SHA2567607c9b4b1a6625acab3d15d65ab98dbc5dfa5a96c38cc83837354364ca50ce4
SHA5124d9a44b8ed59b862cad26457f052dc26edf7842671fad6a824bc43179b672c5bdad4e25e0b67f2fc7872221a5ac9f7d78264387e3fadf12479fc06e1b4e5a35e
-
Filesize
369KB
MD56fe9416809f5da05b48bf86e1375e7be
SHA144ec2fa73a3e5ad6de01605815efedd324d2efca
SHA2567607c9b4b1a6625acab3d15d65ab98dbc5dfa5a96c38cc83837354364ca50ce4
SHA5124d9a44b8ed59b862cad26457f052dc26edf7842671fad6a824bc43179b672c5bdad4e25e0b67f2fc7872221a5ac9f7d78264387e3fadf12479fc06e1b4e5a35e
-
Filesize
369KB
MD56fe9416809f5da05b48bf86e1375e7be
SHA144ec2fa73a3e5ad6de01605815efedd324d2efca
SHA2567607c9b4b1a6625acab3d15d65ab98dbc5dfa5a96c38cc83837354364ca50ce4
SHA5124d9a44b8ed59b862cad26457f052dc26edf7842671fad6a824bc43179b672c5bdad4e25e0b67f2fc7872221a5ac9f7d78264387e3fadf12479fc06e1b4e5a35e