Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe
Resource
win10v2004-20220901-en
General
-
Target
8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe
-
Size
718KB
-
MD5
eb29869c725dd87bea4cdefb0bcc9426
-
SHA1
ba42e8b7fe5cd8981cce8b2f99d5366f9d2b0334
-
SHA256
8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c
-
SHA512
99d91ff1fb737e57a9c21a264a119aef85142340bca7e2e94c722926cb997f6a7da345029e70dbe5a3439bb1e07916f39add51c4409eb711f80a260d44c357f4
-
SSDEEP
12288:+MrNy90p7rfLU5ir5Rk/eQqiKoivyHSaieJCUKiECV0RHcg:rym3DQYy/PqiKoiKy8CUKiEzT
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2256 gsb95mB.exe 1008 gST52ox.exe 1984 afi30fc.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gsb95mB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gsb95mB.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gST52ox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gST52ox.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4928 wrote to memory of 2256 4928 8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe 81 PID 4928 wrote to memory of 2256 4928 8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe 81 PID 4928 wrote to memory of 2256 4928 8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe 81 PID 2256 wrote to memory of 1008 2256 gsb95mB.exe 82 PID 2256 wrote to memory of 1008 2256 gsb95mB.exe 82 PID 2256 wrote to memory of 1008 2256 gsb95mB.exe 82 PID 1008 wrote to memory of 1984 1008 gST52ox.exe 83 PID 1008 wrote to memory of 1984 1008 gST52ox.exe 83 PID 1008 wrote to memory of 1984 1008 gST52ox.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe"C:\Users\Admin\AppData\Local\Temp\8e6f43381c9f193767c4dfef68e809576baebdd47bacfd77a1dec41826f4a77c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gsb95mB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gsb95mB.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gST52ox.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gST52ox.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\afi30fc.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\afi30fc.exe4⤵
- Executes dropped EXE
PID:1984
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
614KB
MD53d921367e22c48d5f7fbb6ff64d839a6
SHA18f8d9b1443b350c3c8b810926dcdc9de8212821a
SHA256e30d81ec9f4c31bf679629bea6edac024e7d20c44fdb3275f192a4637ae199c0
SHA5125311c79923460d5f1117aaaa21d6ee83d98d642760b68471ab5b8616af3d350961d7509d4c6e4fff7d10a6b96e6932636b098b9ccc1cffd99b4d7e65b631ea57
-
Filesize
614KB
MD53d921367e22c48d5f7fbb6ff64d839a6
SHA18f8d9b1443b350c3c8b810926dcdc9de8212821a
SHA256e30d81ec9f4c31bf679629bea6edac024e7d20c44fdb3275f192a4637ae199c0
SHA5125311c79923460d5f1117aaaa21d6ee83d98d642760b68471ab5b8616af3d350961d7509d4c6e4fff7d10a6b96e6932636b098b9ccc1cffd99b4d7e65b631ea57
-
Filesize
286KB
MD55058e1f081b2e3ce596d2636e28b7264
SHA1a870d87ad7f098a2046d31c2f046b03c9e07d142
SHA25654f14793f21e4d0beef4c06501855137c3bc6df1c42abe6b8d11a765a422e809
SHA512a03620ffa1a5f0bd718d3483defac6d4a90fbcd1fb5619e577b7874e438234852a14479f41cf6a5efbf23f34d9c1d6212a67d9c6c053e30a638656ee3b32b0b1
-
Filesize
286KB
MD55058e1f081b2e3ce596d2636e28b7264
SHA1a870d87ad7f098a2046d31c2f046b03c9e07d142
SHA25654f14793f21e4d0beef4c06501855137c3bc6df1c42abe6b8d11a765a422e809
SHA512a03620ffa1a5f0bd718d3483defac6d4a90fbcd1fb5619e577b7874e438234852a14479f41cf6a5efbf23f34d9c1d6212a67d9c6c053e30a638656ee3b32b0b1
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42