Overview
overview
10Static
static
10Redline St...er.exe
windows10-1703-x64
1Redline St...config
windows10-1703-x64
3Redline St...er.pdb
windows10-1703-x64
3Redline St...db.dll
windows10-1703-x64
1Redline St...db.pdb
windows10-1703-x64
3Redline St...db.dll
windows10-1703-x64
1Redline St...db.pdb
windows10-1703-x64
3Redline St...ks.dll
windows10-1703-x64
1Redline St...ks.pdb
windows10-1703-x64
3Redline St...il.dll
windows10-1703-x64
1Redline St...il.pdb
windows10-1703-x64
3Redline St...er.exe
windows10-1703-x64
10Redline St...ub.exe
windows10-1703-x64
10Redline St...st.exe
windows10-1703-x64
1Redline St...config
windows10-1703-x64
3Redline St...CF.dll
windows10-1703-x64
1Redline St...config
windows10-1703-x64
3Redline St...er.exe
windows10-1703-x64
4Redline St...xe.xml
windows10-1703-x64
1Redline St...).docx
windows10-1703-x64
1Redline St...).docx
windows10-1703-x64
1Redline St...AQ.txt
windows10-1703-x64
1Redline St...config
windows10-1703-x64
3Redline St...ne.exe
windows10-1703-x64
10Redline St...rs.txt
windows10-1703-x64
1Redline St...rs.txt
windows10-1703-x64
1Redline St...s.json
windows10-1703-x64
3Redline St...s.json
windows10-1703-x64
3Redline St...me.exe
windows10-1703-x64
8Redline St...48.exe
windows10-1703-x64
7Redline St...ar.exe
windows10-1703-x64
1Redline St...Me.txt
windows10-1703-x64
1Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-03-2023 14:35
Behavioral task
behavioral1
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Kurome.Builder.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Kurome.Builder.exe.config
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Kurome.Builder.pdb
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.Mdb.dll
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.Mdb.pdb
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.Pdb.dll
Resource
win10-20230220-en
Behavioral task
behavioral7
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.Pdb.pdb
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.Rocks.dll
Resource
win10-20230220-en
Behavioral task
behavioral9
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.Rocks.pdb
Resource
win10-20230220-en
Behavioral task
behavioral10
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.dll
Resource
win10-20230220-en
Behavioral task
behavioral11
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/Mono.Cecil.pdb
Resource
win10-20230220-en
Behavioral task
behavioral12
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/builder.exe
Resource
win10-20230220-en
Behavioral task
behavioral13
Sample
Redline Stealer 2022 Cracked/Kurome.Builder/stub.exe
Resource
win10-20230220-en
Behavioral task
behavioral14
Sample
Redline Stealer 2022 Cracked/Kurome.Host/Kurome.Host.exe
Resource
win10-20230220-en
Behavioral task
behavioral15
Sample
Redline Stealer 2022 Cracked/Kurome.Host/Kurome.Host.exe.config
Resource
win10-20230220-en
Behavioral task
behavioral16
Sample
Redline Stealer 2022 Cracked/Kurome.Host/Kurome.WCF.dll
Resource
win10-20230220-en
Behavioral task
behavioral17
Sample
Redline Stealer 2022 Cracked/Kurome.Host/Kurome.WCF.dll.config
Resource
win10-20230220-en
Behavioral task
behavioral18
Sample
Redline Stealer 2022 Cracked/Kurome.Loader/Kurome.Loader.exe
Resource
win10-20230220-en
Behavioral task
behavioral19
Sample
Redline Stealer 2022 Cracked/Kurome.Loader/Kurome.Loader.exe.xml
Resource
win10-20230220-en
Behavioral task
behavioral20
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/FAQ (English).docx
Resource
win10-20230220-en
Behavioral task
behavioral21
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/FAQ(RUS).docx
Resource
win10-20230220-en
Behavioral task
behavioral22
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/FAQ.txt
Resource
win10-20230220-en
Behavioral task
behavioral23
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/Panel.exe.config
Resource
win10-20230220-en
Behavioral task
behavioral24
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/Redline.exe
Resource
win10-20230220-en
Behavioral task
behavioral25
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/chromeBrowsers.txt
Resource
win10-20230220-en
Behavioral task
behavioral26
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/geckoBrowsers.txt
Resource
win10-20230220-en
Behavioral task
behavioral27
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/serviceSettings.json
Resource
win10-20230220-en
Behavioral task
behavioral28
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/telegramChatsSettings.json
Resource
win10-20230220-en
Behavioral task
behavioral29
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Tools/Chrome.exe
Resource
win10-20230220-en
Behavioral task
behavioral30
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Tools/NetFramework48.exe
Resource
win10-20230220-en
Behavioral task
behavioral31
Sample
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Tools/WinRar.exe
Resource
win10-20230220-en
Behavioral task
behavioral32
Sample
Redline Stealer 2022 Cracked/ReadMe.txt
Resource
win10-20230220-en
General
-
Target
Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/Panel.exe.config
-
Size
26KB
-
MD5
494890d393a5a8c54771186a87b0265e
-
SHA1
162fa5909c1c3f84d34bda5d3370a957fe58c9c8
-
SHA256
f2a5a06359713226aeacfe239eeb8ae8606f4588d8e58a19947c3a190efbdfc7
-
SHA512
40fbd033f288fee074fc36e899796efb30d3c582784b834fc583706f19a0b8d5a134c6d1405afe563d2676072e4eefc4e169b2087867cab77a3fa1aa1a7c9395
-
SSDEEP
384:TXe7J7+7m7B7x7e7VCKrfqvUWCBrfqvfVCBrfqvfY:b+U+4+Y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4024 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Redline Stealer 2022 Cracked\Panel\RedLine_20_2\Panel\Panel.exe.config"1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx