Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-03-2023 22:17
Static task
static1
Behavioral task
behavioral1
Sample
21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe
Resource
win10-20230220-en
General
-
Target
21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe
-
Size
667KB
-
MD5
a41314f0329135715157149f9d220dc5
-
SHA1
c259a299b8c27637c34cb12931440e6f9fed389e
-
SHA256
21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99
-
SHA512
5d72b0411440de816794389eb8db138978aa8aecf7419d0776c30016eed11284f0694657bd0f985f679d5fee82ad8814bf76015c64bb06b2153236b96f8467c1
-
SSDEEP
12288:YMrjy90PM8VZDFkloe/6wDWvFNTotS8dsa/Cteo5CLv5D5YI8bzk1ggxzK:LyaFVEl5/6Uhkva6tZ5CLvFj67gxzK
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
well
193.233.20.28:4125
-
auth_value
265e7373dd436339d88347c08a10b402
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection r8227fl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r8227fl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r8227fl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r8227fl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r8227fl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r8227fl.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1648-123-0x0000000000660000-0x00000000006A6000-memory.dmp family_redline behavioral1/memory/1648-124-0x00000000023E0000-0x0000000002424000-memory.dmp family_redline behavioral1/memory/1648-125-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-128-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-126-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-130-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-132-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-134-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-136-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-138-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-140-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-142-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-144-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-146-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-148-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-150-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-152-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-154-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-156-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-158-0x00000000023E0000-0x000000000241E000-memory.dmp family_redline behavioral1/memory/1648-1034-0x0000000000BC0000-0x0000000000C00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 924 ycWd6411Od.exe 668 r8227fl.exe 1648 w04wq45.exe 1548 xZAFh20.exe -
Loads dropped DLL 10 IoCs
pid Process 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 924 ycWd6411Od.exe 924 ycWd6411Od.exe 924 ycWd6411Od.exe 668 r8227fl.exe 924 ycWd6411Od.exe 924 ycWd6411Od.exe 1648 w04wq45.exe 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 1548 xZAFh20.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features r8227fl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r8227fl.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycWd6411Od.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycWd6411Od.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 668 r8227fl.exe 668 r8227fl.exe 1648 w04wq45.exe 1648 w04wq45.exe 1548 xZAFh20.exe 1548 xZAFh20.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 668 r8227fl.exe Token: SeDebugPrivilege 1648 w04wq45.exe Token: SeDebugPrivilege 1548 xZAFh20.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1212 wrote to memory of 924 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 28 PID 1212 wrote to memory of 924 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 28 PID 1212 wrote to memory of 924 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 28 PID 1212 wrote to memory of 924 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 28 PID 1212 wrote to memory of 924 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 28 PID 1212 wrote to memory of 924 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 28 PID 1212 wrote to memory of 924 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 28 PID 924 wrote to memory of 668 924 ycWd6411Od.exe 29 PID 924 wrote to memory of 668 924 ycWd6411Od.exe 29 PID 924 wrote to memory of 668 924 ycWd6411Od.exe 29 PID 924 wrote to memory of 668 924 ycWd6411Od.exe 29 PID 924 wrote to memory of 668 924 ycWd6411Od.exe 29 PID 924 wrote to memory of 668 924 ycWd6411Od.exe 29 PID 924 wrote to memory of 668 924 ycWd6411Od.exe 29 PID 924 wrote to memory of 1648 924 ycWd6411Od.exe 30 PID 924 wrote to memory of 1648 924 ycWd6411Od.exe 30 PID 924 wrote to memory of 1648 924 ycWd6411Od.exe 30 PID 924 wrote to memory of 1648 924 ycWd6411Od.exe 30 PID 924 wrote to memory of 1648 924 ycWd6411Od.exe 30 PID 924 wrote to memory of 1648 924 ycWd6411Od.exe 30 PID 924 wrote to memory of 1648 924 ycWd6411Od.exe 30 PID 1212 wrote to memory of 1548 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 32 PID 1212 wrote to memory of 1548 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 32 PID 1212 wrote to memory of 1548 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 32 PID 1212 wrote to memory of 1548 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 32 PID 1212 wrote to memory of 1548 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 32 PID 1212 wrote to memory of 1548 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 32 PID 1212 wrote to memory of 1548 1212 21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe"C:\Users\Admin\AppData\Local\Temp\21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b3cbfcd14491f891be0baef768f2a4da
SHA147be5bb6f31976fad7f904f52a19a177f84e04de
SHA2560c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f
SHA512330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf
-
Filesize
175KB
MD5b3cbfcd14491f891be0baef768f2a4da
SHA147be5bb6f31976fad7f904f52a19a177f84e04de
SHA2560c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f
SHA512330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf
-
Filesize
522KB
MD57818447aa8f250bb085a72f12d0a26ca
SHA1ec97aa9f13bff33ee8c6625e9e55f7c7116504ad
SHA25662566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060
SHA51224b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a
-
Filesize
522KB
MD57818447aa8f250bb085a72f12d0a26ca
SHA1ec97aa9f13bff33ee8c6625e9e55f7c7116504ad
SHA25662566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060
SHA51224b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a
-
Filesize
244KB
MD5a4f6ef55bc240fa164dd7b91008e7258
SHA18656db9bc0d7fe133ec1d4848809d9b8ce363d68
SHA256122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45
SHA512f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c
-
Filesize
244KB
MD5a4f6ef55bc240fa164dd7b91008e7258
SHA18656db9bc0d7fe133ec1d4848809d9b8ce363d68
SHA256122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45
SHA512f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c
-
Filesize
244KB
MD5a4f6ef55bc240fa164dd7b91008e7258
SHA18656db9bc0d7fe133ec1d4848809d9b8ce363d68
SHA256122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45
SHA512f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c
-
Filesize
302KB
MD598dfda5eccb7864ae397ac064e4fb1a5
SHA1b455802e4e992fcc90c025b94cd0826bfda105b2
SHA2567912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba
SHA512c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348
-
Filesize
302KB
MD598dfda5eccb7864ae397ac064e4fb1a5
SHA1b455802e4e992fcc90c025b94cd0826bfda105b2
SHA2567912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba
SHA512c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348
-
Filesize
302KB
MD598dfda5eccb7864ae397ac064e4fb1a5
SHA1b455802e4e992fcc90c025b94cd0826bfda105b2
SHA2567912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba
SHA512c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348
-
Filesize
175KB
MD5b3cbfcd14491f891be0baef768f2a4da
SHA147be5bb6f31976fad7f904f52a19a177f84e04de
SHA2560c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f
SHA512330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf
-
Filesize
175KB
MD5b3cbfcd14491f891be0baef768f2a4da
SHA147be5bb6f31976fad7f904f52a19a177f84e04de
SHA2560c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f
SHA512330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf
-
Filesize
522KB
MD57818447aa8f250bb085a72f12d0a26ca
SHA1ec97aa9f13bff33ee8c6625e9e55f7c7116504ad
SHA25662566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060
SHA51224b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a
-
Filesize
522KB
MD57818447aa8f250bb085a72f12d0a26ca
SHA1ec97aa9f13bff33ee8c6625e9e55f7c7116504ad
SHA25662566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060
SHA51224b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a
-
Filesize
244KB
MD5a4f6ef55bc240fa164dd7b91008e7258
SHA18656db9bc0d7fe133ec1d4848809d9b8ce363d68
SHA256122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45
SHA512f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c
-
Filesize
244KB
MD5a4f6ef55bc240fa164dd7b91008e7258
SHA18656db9bc0d7fe133ec1d4848809d9b8ce363d68
SHA256122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45
SHA512f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c
-
Filesize
244KB
MD5a4f6ef55bc240fa164dd7b91008e7258
SHA18656db9bc0d7fe133ec1d4848809d9b8ce363d68
SHA256122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45
SHA512f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c
-
Filesize
302KB
MD598dfda5eccb7864ae397ac064e4fb1a5
SHA1b455802e4e992fcc90c025b94cd0826bfda105b2
SHA2567912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba
SHA512c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348
-
Filesize
302KB
MD598dfda5eccb7864ae397ac064e4fb1a5
SHA1b455802e4e992fcc90c025b94cd0826bfda105b2
SHA2567912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba
SHA512c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348
-
Filesize
302KB
MD598dfda5eccb7864ae397ac064e4fb1a5
SHA1b455802e4e992fcc90c025b94cd0826bfda105b2
SHA2567912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba
SHA512c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348