Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-03-2023 14:35

General

  • Target

    Redline Stealer 2022 Cracked/Panel/RedLine_20_2/Panel/Redline.exe

  • Size

    6.9MB

  • MD5

    711b17c1f1f5155907f210e8592ccba6

  • SHA1

    3ff3e70af9b8353ced6769b8077c259274c00324

  • SHA256

    9d262aa6c3602d81ec06e740a1743d3436b04d03ac0744b8b214d7f7c75effa7

  • SHA512

    c97548f389661015ba886145bc963206fd11d0aecd2dfb3e8d1ff943c1b8aa7a6e2ddb9a915a514469c172a1ac97cdf7ef379074a6d5b9625c55606a7a25bf14

  • SSDEEP

    196608:TSrpFpEARqU31Dkhg/oJTqRcpvT3CT+ubFGc3hnSIH+HW7f:TS9ESqYmgy3fUAcJd+HO

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 16 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer 2022 Cracked\Panel\RedLine_20_2\Panel\Redline.exe
    "C:\Users\Admin\AppData\Local\Temp\Redline Stealer 2022 Cracked\Panel\RedLine_20_2\Panel\Redline.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\Syvcnylrysj.exe
      "C:\Users\Admin\AppData\Local\Temp\Syvcnylrysj.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3896
      • C:\Users\Admin\AppData\Local\Temp\Syvcnylrysj.exe
        "C:\Users\Admin\AppData\Local\Temp\Syvcnylrysj.exe" "--monitor"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1392
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1392 -s 2244
          4⤵
          • Program crash
          PID:3420
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3896 -s 2652
        3⤵
        • Program crash
        PID:1348
    • C:\Users\Admin\AppData\Local\Temp\Bvbibhmnibcivm.exe
      "C:\Users\Admin\AppData\Local\Temp\Bvbibhmnibcivm.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3724

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bvbibhmnibcivm.exe
    Filesize

    38KB

    MD5

    b5086eebe0a0a878807a677aeb4fc4f6

    SHA1

    313913645d57696233293197c9e5cff932535e6e

    SHA256

    69029912f948d6bd6c3084ca34885cdeef97190865f6838c9a928fad56b3f958

    SHA512

    1a6e732b0cbd0b89b8b7fe4472d76df46f44d757b550526e88d9c3c01170332d3ef20304a8106cfb47923e466b6dfe6ffdc4b77350c4394ea9ebb72100e0787b

  • C:\Users\Admin\AppData\Local\Temp\Bvbibhmnibcivm.exe
    Filesize

    38KB

    MD5

    b5086eebe0a0a878807a677aeb4fc4f6

    SHA1

    313913645d57696233293197c9e5cff932535e6e

    SHA256

    69029912f948d6bd6c3084ca34885cdeef97190865f6838c9a928fad56b3f958

    SHA512

    1a6e732b0cbd0b89b8b7fe4472d76df46f44d757b550526e88d9c3c01170332d3ef20304a8106cfb47923e466b6dfe6ffdc4b77350c4394ea9ebb72100e0787b

  • C:\Users\Admin\AppData\Local\Temp\Syvcnylrysj.exe
    Filesize

    9.3MB

    MD5

    f4e19b67ef27af1434151a512860574e

    SHA1

    56304fc2729974124341e697f3b21c84a8dd242a

    SHA256

    c7a8709013ada38fc2e1ceb3b15631f2aea8e156eb3f0aa197e02df1259a493a

    SHA512

    a92e73d58c51bb74618987f06166f52a65ed1525410aec1b8e377ea8547c1123e313e13e305310f7a750c4561756d87ff558670bf4df8b62ea874d6f7c14ca77

  • C:\Users\Admin\AppData\Local\Temp\Syvcnylrysj.exe
    Filesize

    9.3MB

    MD5

    f4e19b67ef27af1434151a512860574e

    SHA1

    56304fc2729974124341e697f3b21c84a8dd242a

    SHA256

    c7a8709013ada38fc2e1ceb3b15631f2aea8e156eb3f0aa197e02df1259a493a

    SHA512

    a92e73d58c51bb74618987f06166f52a65ed1525410aec1b8e377ea8547c1123e313e13e305310f7a750c4561756d87ff558670bf4df8b62ea874d6f7c14ca77

  • C:\Users\Admin\AppData\Local\Temp\Syvcnylrysj.exe
    Filesize

    9.3MB

    MD5

    f4e19b67ef27af1434151a512860574e

    SHA1

    56304fc2729974124341e697f3b21c84a8dd242a

    SHA256

    c7a8709013ada38fc2e1ceb3b15631f2aea8e156eb3f0aa197e02df1259a493a

    SHA512

    a92e73d58c51bb74618987f06166f52a65ed1525410aec1b8e377ea8547c1123e313e13e305310f7a750c4561756d87ff558670bf4df8b62ea874d6f7c14ca77

  • memory/1392-2173-0x00007FFF9C0D0000-0x00007FFF9C0D1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2169-0x00007FFF9C2E0000-0x00007FFF9C2E1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2118-0x000000001ABB0000-0x000000001AD50000-memory.dmp
    Filesize

    1.6MB

  • memory/1392-2163-0x00007FFF9C2A0000-0x00007FFF9C2A1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2178-0x00007FFF9BFB0000-0x00007FFF9BFB1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2176-0x00007FFF9C2C0000-0x00007FFF9C2C1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2177-0x00007FFF9C280000-0x00007FFF9C281000-memory.dmp
    Filesize

    4KB

  • memory/1392-2174-0x00007FFF9C0F0000-0x00007FFF9C0F1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2175-0x000000001AD60000-0x000000001AD70000-memory.dmp
    Filesize

    64KB

  • memory/1392-2165-0x00007FFF9BFD0000-0x00007FFF9BFD1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2166-0x00007FFF9BF30000-0x00007FFF9BF31000-memory.dmp
    Filesize

    4KB

  • memory/1392-2172-0x00007FFF9BFF0000-0x00007FFF9BFF1000-memory.dmp
    Filesize

    4KB

  • memory/1392-2168-0x00007FFF9BF70000-0x00007FFF9BF71000-memory.dmp
    Filesize

    4KB

  • memory/2408-123-0x000000001C100000-0x000000001C110000-memory.dmp
    Filesize

    64KB

  • memory/2408-121-0x0000000000DB0000-0x00000000014A0000-memory.dmp
    Filesize

    6.9MB

  • memory/3724-135-0x000001CED0EA0000-0x000001CED0EB0000-memory.dmp
    Filesize

    64KB

  • memory/3724-982-0x000001CEEB470000-0x000001CEEB480000-memory.dmp
    Filesize

    64KB

  • memory/3724-158-0x000001CEEB470000-0x000001CEEB480000-memory.dmp
    Filesize

    64KB

  • memory/3896-213-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-226-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-170-0x00007FFF9BF70000-0x00007FFF9BF71000-memory.dmp
    Filesize

    4KB

  • memory/3896-171-0x000000001D7E0000-0x000000001D922000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-173-0x000000001D7E0000-0x000000001D922000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-175-0x00007FFF9BFF0000-0x00007FFF9BFF1000-memory.dmp
    Filesize

    4KB

  • memory/3896-177-0x00007FFF9C0C0000-0x00007FFF9C0C1000-memory.dmp
    Filesize

    4KB

  • memory/3896-172-0x00007FFF9C2E0000-0x00007FFF9C2E1000-memory.dmp
    Filesize

    4KB

  • memory/3896-168-0x00007FFF9BFC0000-0x00007FFF9BFC1000-memory.dmp
    Filesize

    4KB

  • memory/3896-179-0x00007FFF9BFE0000-0x00007FFF9BFE1000-memory.dmp
    Filesize

    4KB

  • memory/3896-181-0x00007FFF9C0F0000-0x00007FFF9C0F1000-memory.dmp
    Filesize

    4KB

  • memory/3896-180-0x000000001D7E0000-0x000000001D922000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-183-0x00007FFF9C2C0000-0x00007FFF9C2C1000-memory.dmp
    Filesize

    4KB

  • memory/3896-185-0x00007FFF9C2B0000-0x00007FFF9C2B1000-memory.dmp
    Filesize

    4KB

  • memory/3896-187-0x00007FFF9C280000-0x00007FFF9C281000-memory.dmp
    Filesize

    4KB

  • memory/3896-189-0x00007FFF9C120000-0x00007FFF9C121000-memory.dmp
    Filesize

    4KB

  • memory/3896-192-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-193-0x000000001AE00000-0x000000001AE0A000-memory.dmp
    Filesize

    40KB

  • memory/3896-194-0x000000001AE00000-0x000000001AE0A000-memory.dmp
    Filesize

    40KB

  • memory/3896-196-0x000000001AE00000-0x000000001AE0A000-memory.dmp
    Filesize

    40KB

  • memory/3896-198-0x000000001AE00000-0x000000001AE0A000-memory.dmp
    Filesize

    40KB

  • memory/3896-205-0x000000001AE60000-0x000000001AE6A000-memory.dmp
    Filesize

    40KB

  • memory/3896-206-0x00007FFF8FD50000-0x00007FFF8FE7C000-memory.dmp
    Filesize

    1.2MB

  • memory/3896-208-0x000000001AE60000-0x000000001AE6A000-memory.dmp
    Filesize

    40KB

  • memory/3896-209-0x000000001AE60000-0x000000001AE6A000-memory.dmp
    Filesize

    40KB

  • memory/3896-210-0x000000001AE60000-0x000000001AE6A000-memory.dmp
    Filesize

    40KB

  • memory/3896-212-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-167-0x00007FFF9BFD0000-0x00007FFF9BFD1000-memory.dmp
    Filesize

    4KB

  • memory/3896-214-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-216-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-218-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-219-0x00007FFF9BF60000-0x00007FFF9BF61000-memory.dmp
    Filesize

    4KB

  • memory/3896-222-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-223-0x00007FFF9BFA0000-0x00007FFF9BFA1000-memory.dmp
    Filesize

    4KB

  • memory/3896-224-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-221-0x00007FFF9BFB0000-0x00007FFF9BFB1000-memory.dmp
    Filesize

    4KB

  • memory/3896-220-0x000000001DBB0000-0x000000001DCF2000-memory.dmp
    Filesize

    1.3MB

  • memory/3896-217-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-215-0x00007FFF9C0D0000-0x00007FFF9C0D1000-memory.dmp
    Filesize

    4KB

  • memory/3896-169-0x00007FFF9BF30000-0x00007FFF9BF31000-memory.dmp
    Filesize

    4KB

  • memory/3896-225-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-237-0x000000001E300000-0x000000001E31C000-memory.dmp
    Filesize

    112KB

  • memory/3896-318-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-321-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-410-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-603-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-703-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-894-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-984-0x000000001AE80000-0x000000001B020000-memory.dmp
    Filesize

    1.6MB

  • memory/3896-1073-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-1077-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-1074-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-1262-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-1263-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3896-1266-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-1358-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-1576-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-1577-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-1668-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-1780-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-1888-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-2104-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-162-0x0000000002080000-0x0000000002081000-memory.dmp
    Filesize

    4KB

  • memory/3896-166-0x00007FFF9C2A0000-0x00007FFF9C2A1000-memory.dmp
    Filesize

    4KB

  • memory/3896-2162-0x000000001EDD0000-0x000000001EED0000-memory.dmp
    Filesize

    1024KB

  • memory/3896-164-0x00007FFF9BF40000-0x00007FFF9BF41000-memory.dmp
    Filesize

    4KB

  • memory/3896-165-0x00007FFF9C2D0000-0x00007FFF9C2D1000-memory.dmp
    Filesize

    4KB

  • memory/3896-160-0x000000001AE80000-0x000000001B020000-memory.dmp
    Filesize

    1.6MB

  • memory/3896-157-0x0000000180000000-0x0000000180005000-memory.dmp
    Filesize

    20KB

  • memory/3896-155-0x0000000180000000-0x0000000180005000-memory.dmp
    Filesize

    20KB

  • memory/3896-153-0x0000000180000000-0x0000000180005000-memory.dmp
    Filesize

    20KB

  • memory/3896-149-0x0000000180000000-0x0000000180005000-memory.dmp
    Filesize

    20KB

  • memory/3896-150-0x0000000180000000-0x0000000180005000-memory.dmp
    Filesize

    20KB

  • memory/3896-138-0x000000001AE80000-0x000000001B020000-memory.dmp
    Filesize

    1.6MB

  • memory/3896-137-0x000000001AE80000-0x000000001B020000-memory.dmp
    Filesize

    1.6MB

  • memory/3896-136-0x000000001AE80000-0x000000001B020000-memory.dmp
    Filesize

    1.6MB

  • memory/3896-134-0x00007FFF80A50000-0x00007FFF8143C000-memory.dmp
    Filesize

    9.9MB