Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06-03-2023 06:16
Static task
static1
Behavioral task
behavioral1
Sample
1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe
Resource
win10-20230220-en
General
-
Target
1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe
-
Size
557KB
-
MD5
356ca93a57b4e0a44a8348c3b36834e0
-
SHA1
3ddd6de6cdd071c123bf6c511742f8f62d392802
-
SHA256
1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654
-
SHA512
e9056d81aabbb91b59dfdf546ffa891bb7de77b6f9a97a083fa74bdb574972c6b3d8cd7362e339706eac1a44d9b1fd549c00fb315284fb165164b7ef95b612ba
-
SSDEEP
12288:aMr7y90LCoFM3aHCxtGUiNo+xxwsmzBqfcFtGJG2OUN4GhIJeY:9ysKB7iNpvxmzBgYGJGhUNjQx
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf24FL01hL92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf24FL01hL92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf24FL01hL92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf24FL01hL92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf24FL01hL92.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2636-141-0x0000000004940000-0x0000000004986000-memory.dmp family_redline behavioral1/memory/2636-143-0x00000000049D0000-0x0000000004A14000-memory.dmp family_redline behavioral1/memory/2636-148-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-149-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-151-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-153-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-155-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-157-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-159-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-161-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-163-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-165-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-167-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-169-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-171-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-173-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-175-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-177-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-179-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-181-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-183-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-185-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-187-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-189-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-191-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-193-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-195-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-197-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-199-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-201-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-203-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-205-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-207-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-209-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline behavioral1/memory/2636-211-0x00000000049D0000-0x0000000004A0E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2296 vhFY9872rl.exe 2572 sf24FL01hL92.exe 2636 tf49An47GD68.exe 2608 uhhy56Li42MB.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf24FL01hL92.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhFY9872rl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhFY9872rl.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2572 sf24FL01hL92.exe 2572 sf24FL01hL92.exe 2636 tf49An47GD68.exe 2636 tf49An47GD68.exe 2608 uhhy56Li42MB.exe 2608 uhhy56Li42MB.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2572 sf24FL01hL92.exe Token: SeDebugPrivilege 2636 tf49An47GD68.exe Token: SeDebugPrivilege 2608 uhhy56Li42MB.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 380 wrote to memory of 2296 380 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe 66 PID 380 wrote to memory of 2296 380 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe 66 PID 380 wrote to memory of 2296 380 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe 66 PID 2296 wrote to memory of 2572 2296 vhFY9872rl.exe 67 PID 2296 wrote to memory of 2572 2296 vhFY9872rl.exe 67 PID 2296 wrote to memory of 2636 2296 vhFY9872rl.exe 68 PID 2296 wrote to memory of 2636 2296 vhFY9872rl.exe 68 PID 2296 wrote to memory of 2636 2296 vhFY9872rl.exe 68 PID 380 wrote to memory of 2608 380 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe 70 PID 380 wrote to memory of 2608 380 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe 70 PID 380 wrote to memory of 2608 380 1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe"C:\Users\Admin\AppData\Local\Temp\1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFY9872rl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFY9872rl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24FL01hL92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24FL01hL92.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49An47GD68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49An47GD68.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhhy56Li42MB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhhy56Li42MB.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ae0d5bfdbbf52c1c58d105e9114a1a14
SHA10e44a3f8ff22668b80e60dbd8608249f77527598
SHA256881d41b35a57b053d02187aa5633f2f8f1ccd0b13eaea112dc98d9b0708d6f1c
SHA5129c5707a73f10fadae75ea3bb358b42f3dc7a3d143ba173a0f34a579472272bbc41a5a6d17664053b5c1c9ecfee21c30c41eb498a35c199ddac5081ea167662e9
-
Filesize
175KB
MD5ae0d5bfdbbf52c1c58d105e9114a1a14
SHA10e44a3f8ff22668b80e60dbd8608249f77527598
SHA256881d41b35a57b053d02187aa5633f2f8f1ccd0b13eaea112dc98d9b0708d6f1c
SHA5129c5707a73f10fadae75ea3bb358b42f3dc7a3d143ba173a0f34a579472272bbc41a5a6d17664053b5c1c9ecfee21c30c41eb498a35c199ddac5081ea167662e9
-
Filesize
412KB
MD58e244ed2cf2c4715fbc8039c76a45926
SHA19e7457cc721c61c5f840bb97438cb828d0205e8c
SHA2566ebe5c0ef4ca42525197ab1408091d1c68db21c16a1bb7e461844899f218fb58
SHA51245c469fe3e94f2eea5e45cbe6b6657917087545f93782a2ea0b8bec48774a889d73ae3631ba0323f644a1152d256daa19d48e1bafadc17c803586d5f1bd020d7
-
Filesize
412KB
MD58e244ed2cf2c4715fbc8039c76a45926
SHA19e7457cc721c61c5f840bb97438cb828d0205e8c
SHA2566ebe5c0ef4ca42525197ab1408091d1c68db21c16a1bb7e461844899f218fb58
SHA51245c469fe3e94f2eea5e45cbe6b6657917087545f93782a2ea0b8bec48774a889d73ae3631ba0323f644a1152d256daa19d48e1bafadc17c803586d5f1bd020d7
-
Filesize
11KB
MD56ed7fab0bb82c42f011565c93210834b
SHA1bcfbd13d94ba5a1036e071b63791a404390bc283
SHA256000a591a433ed55245f10f819b04ea6f956437421211204d9402e484249dd4c9
SHA5124771b02ccb1df4abffbcb86c6fdd3af57d70e3895757fafe63090b37dbb944a1351283dcb7f1cee910bcb5f06b41fa342c3fa31783f17973fc5880915192df51
-
Filesize
11KB
MD56ed7fab0bb82c42f011565c93210834b
SHA1bcfbd13d94ba5a1036e071b63791a404390bc283
SHA256000a591a433ed55245f10f819b04ea6f956437421211204d9402e484249dd4c9
SHA5124771b02ccb1df4abffbcb86c6fdd3af57d70e3895757fafe63090b37dbb944a1351283dcb7f1cee910bcb5f06b41fa342c3fa31783f17973fc5880915192df51
-
Filesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187
-
Filesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187