Analysis
-
max time kernel
53s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05/03/2023, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe
Resource
win10-20230220-en
General
-
Target
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe
-
Size
526KB
-
MD5
d80e1e1a576533180129bd59e70f2471
-
SHA1
23251426fd645179243ac669b8cc5f48e262f118
-
SHA256
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6
-
SHA512
ecb1d70fe2cba143c9c459c9bbc80175c08454ecc0d887bdd4c9b57e1ea320ae032a16c810d58350be2d683cdcc04387ff21a3fe9f162a7959949e2eefd97441
-
SSDEEP
12288:CMrly901bFVqxeS0MwO6pAbAoyuEs1pZedXwD0O:/yuLAP6p8dysmhg
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf63Bo09rL00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf63Bo09rL00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf63Bo09rL00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf63Bo09rL00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf63Bo09rL00.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2148-137-0x00000000024A0000-0x00000000024E6000-memory.dmp family_redline behavioral1/memory/2148-139-0x0000000005020000-0x0000000005064000-memory.dmp family_redline behavioral1/memory/2148-140-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-141-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-143-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-145-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-147-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-149-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-151-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-153-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-155-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-157-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-159-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-164-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-166-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-168-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-170-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-172-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-174-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-176-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-178-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-180-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-182-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-184-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-186-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-188-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-190-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-192-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-194-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-196-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-198-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-200-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-202-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-204-0x0000000005020000-0x000000000505E000-memory.dmp family_redline behavioral1/memory/2148-206-0x0000000005020000-0x000000000505E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4276 vhii4264xE.exe 4848 sf63Bo09rL00.exe 2148 tf31ej70cg91.exe 4784 uhPV82Gb13OO.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf63Bo09rL00.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhii4264xE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhii4264xE.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4848 sf63Bo09rL00.exe 4848 sf63Bo09rL00.exe 2148 tf31ej70cg91.exe 2148 tf31ej70cg91.exe 4784 uhPV82Gb13OO.exe 4784 uhPV82Gb13OO.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4848 sf63Bo09rL00.exe Token: SeDebugPrivilege 2148 tf31ej70cg91.exe Token: SeDebugPrivilege 4784 uhPV82Gb13OO.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4276 2588 fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe 66 PID 2588 wrote to memory of 4276 2588 fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe 66 PID 2588 wrote to memory of 4276 2588 fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe 66 PID 4276 wrote to memory of 4848 4276 vhii4264xE.exe 67 PID 4276 wrote to memory of 4848 4276 vhii4264xE.exe 67 PID 4276 wrote to memory of 2148 4276 vhii4264xE.exe 68 PID 4276 wrote to memory of 2148 4276 vhii4264xE.exe 68 PID 4276 wrote to memory of 2148 4276 vhii4264xE.exe 68 PID 2588 wrote to memory of 4784 2588 fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe 70 PID 2588 wrote to memory of 4784 2588 fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe 70 PID 2588 wrote to memory of 4784 2588 fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe"C:\Users\Admin\AppData\Local\Temp\fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhii4264xE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhii4264xE.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf63Bo09rL00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf63Bo09rL00.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf31ej70cg91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf31ej70cg91.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhPV82Gb13OO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhPV82Gb13OO.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55c28c9068387199f0c7e4e53f672d5c2
SHA1074bd784eebe03e91ec563a8f8eb6e75da2f99dd
SHA25683c1eb4770b5200d2c0b5e10fce45c8b406c9aacb16e82b20576ed37244e517a
SHA512149e0080d647d228eef4676b742b9b51a9ed6c865398eecc463e3da94c1aa7423a329aa4c596cdb94885845a54697a2e014b6972f0ae6f6727e2bd43b151c384
-
Filesize
175KB
MD55c28c9068387199f0c7e4e53f672d5c2
SHA1074bd784eebe03e91ec563a8f8eb6e75da2f99dd
SHA25683c1eb4770b5200d2c0b5e10fce45c8b406c9aacb16e82b20576ed37244e517a
SHA512149e0080d647d228eef4676b742b9b51a9ed6c865398eecc463e3da94c1aa7423a329aa4c596cdb94885845a54697a2e014b6972f0ae6f6727e2bd43b151c384
-
Filesize
381KB
MD5ba2f584def47c324f245b5179cc03658
SHA16fbf3f93a610d2595ab749ced43604d60fdf71ac
SHA2566b61549dfd74036146564474701336f42ff7d0f9d0454a14e498dcf22d63f4f3
SHA5125d4f1faa743a5f5ce737965d7c2dd7f00fef3622951c33dd5cd9721b1afe9999a208605ac7b6703fb95efadeed5f452f252f0538f4b93f990bee09f56096c003
-
Filesize
381KB
MD5ba2f584def47c324f245b5179cc03658
SHA16fbf3f93a610d2595ab749ced43604d60fdf71ac
SHA2566b61549dfd74036146564474701336f42ff7d0f9d0454a14e498dcf22d63f4f3
SHA5125d4f1faa743a5f5ce737965d7c2dd7f00fef3622951c33dd5cd9721b1afe9999a208605ac7b6703fb95efadeed5f452f252f0538f4b93f990bee09f56096c003
-
Filesize
11KB
MD52cd7a553a6257fbbacbe6001c62c7208
SHA1ad82963f785062ffedf1177804c90d1bb81ee9f5
SHA25671e318348a3dbea4ed5e27d24f5810eb24938c320621cad9045196400af3d161
SHA5122589974ac81019f4a6388acc7cc43083f39e8366e87ee59393d0b42d0b85468ed51e5c64b4292b3af898ffc2769328a7949f95437bc315e0da318f795c79228d
-
Filesize
11KB
MD52cd7a553a6257fbbacbe6001c62c7208
SHA1ad82963f785062ffedf1177804c90d1bb81ee9f5
SHA25671e318348a3dbea4ed5e27d24f5810eb24938c320621cad9045196400af3d161
SHA5122589974ac81019f4a6388acc7cc43083f39e8366e87ee59393d0b42d0b85468ed51e5c64b4292b3af898ffc2769328a7949f95437bc315e0da318f795c79228d
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72