Analysis
-
max time kernel
50s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2023, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe
Resource
win10-20230220-en
General
-
Target
fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe
-
Size
875KB
-
MD5
1c554b64550fd91edf02aa244c3c92bb
-
SHA1
208150956f636668db1c8f92be5f16b48f035466
-
SHA256
fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e
-
SHA512
e9b7e702c7ea87b31786d232ff561deba624386a61f91366ae24f7bb3cac84b744bbe26b628286fbe72ef7d1243a8f83cf9b7aa60dbef9c80610fb6fdb52ab69
-
SSDEEP
24576:PyVPjvuwLdrNUdT2hL1utQS1HSDJTeizDoP:aVbvuIxUshL1AHSdT
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3009iF.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4936-192-0x0000000004680000-0x00000000046C6000-memory.dmp family_redline behavioral1/memory/4936-193-0x0000000007090000-0x00000000070D4000-memory.dmp family_redline behavioral1/memory/4936-194-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-195-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-197-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-199-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-201-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-203-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-205-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-207-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-209-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-213-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-216-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-219-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-221-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-223-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-225-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-227-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-229-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4936-231-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4168 tice9085.exe 4516 tice3354.exe 4564 b3009iF.exe 4756 c30Po16.exe 4936 dOCmp49.exe 5020 e33TG38.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3009iF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c30Po16.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9085.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9085.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3354.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4564 b3009iF.exe 4564 b3009iF.exe 4756 c30Po16.exe 4756 c30Po16.exe 4936 dOCmp49.exe 4936 dOCmp49.exe 5020 e33TG38.exe 5020 e33TG38.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4564 b3009iF.exe Token: SeDebugPrivilege 4756 c30Po16.exe Token: SeDebugPrivilege 4936 dOCmp49.exe Token: SeDebugPrivilege 5020 e33TG38.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4168 4448 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 66 PID 4448 wrote to memory of 4168 4448 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 66 PID 4448 wrote to memory of 4168 4448 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 66 PID 4168 wrote to memory of 4516 4168 tice9085.exe 67 PID 4168 wrote to memory of 4516 4168 tice9085.exe 67 PID 4168 wrote to memory of 4516 4168 tice9085.exe 67 PID 4516 wrote to memory of 4564 4516 tice3354.exe 68 PID 4516 wrote to memory of 4564 4516 tice3354.exe 68 PID 4516 wrote to memory of 4756 4516 tice3354.exe 69 PID 4516 wrote to memory of 4756 4516 tice3354.exe 69 PID 4516 wrote to memory of 4756 4516 tice3354.exe 69 PID 4168 wrote to memory of 4936 4168 tice9085.exe 70 PID 4168 wrote to memory of 4936 4168 tice9085.exe 70 PID 4168 wrote to memory of 4936 4168 tice9085.exe 70 PID 4448 wrote to memory of 5020 4448 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 72 PID 4448 wrote to memory of 5020 4448 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 72 PID 4448 wrote to memory of 5020 4448 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe"C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e33TG38.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e33TG38.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
731KB
MD5cac18e6ffcb0aff970d1721f2e763619
SHA15488e590ea27f95f0381e6bead24196bedf4f6c1
SHA256bd738e4eadce9615cea81ae4aa2a2fd2821cfbd8f0da72f37fc9e59df4934128
SHA512a823156e30a803922c73d299845548a74e65c341cbe9f04c20e583b524340c7cae13da03b9dee4e2fffe234e34677f1f1d2bc7bea571c31e115e4a63a550682f
-
Filesize
731KB
MD5cac18e6ffcb0aff970d1721f2e763619
SHA15488e590ea27f95f0381e6bead24196bedf4f6c1
SHA256bd738e4eadce9615cea81ae4aa2a2fd2821cfbd8f0da72f37fc9e59df4934128
SHA512a823156e30a803922c73d299845548a74e65c341cbe9f04c20e583b524340c7cae13da03b9dee4e2fffe234e34677f1f1d2bc7bea571c31e115e4a63a550682f
-
Filesize
409KB
MD56c818ec8d3828554770537a6a2d0fe7d
SHA190cab6f36316d51363a3d80fc33d1699a404433f
SHA2569cce3bf35f9a52533003b1c0519559e0806ec540ada13aea6c414c65a33bb588
SHA512c0eb2a0ed73075eff446c6e05dcca814b63fc3dfd1769d646a40cfd1daf48e2c1ebc61f08c6f4bc07b8c2aa369cda4424b26adcf709f9a6263a4d622641649b5
-
Filesize
409KB
MD56c818ec8d3828554770537a6a2d0fe7d
SHA190cab6f36316d51363a3d80fc33d1699a404433f
SHA2569cce3bf35f9a52533003b1c0519559e0806ec540ada13aea6c414c65a33bb588
SHA512c0eb2a0ed73075eff446c6e05dcca814b63fc3dfd1769d646a40cfd1daf48e2c1ebc61f08c6f4bc07b8c2aa369cda4424b26adcf709f9a6263a4d622641649b5
-
Filesize
366KB
MD5752536930b8c7e3092815baa5d889a5b
SHA19156a270f543c9c9e30ca83258b511d9b6239758
SHA256ae243556ab9d490c0f9978d48df703740ab0a5ffc3f99d923acda206faa2566e
SHA5120b3f32996686956ba327b134d17f25dbe2ae71dfcb6c0144cd974e4ce054aaa622cb7a093f3fe06bca633578d9b7be41996c9646f9873c79cb17c8bb4f984814
-
Filesize
366KB
MD5752536930b8c7e3092815baa5d889a5b
SHA19156a270f543c9c9e30ca83258b511d9b6239758
SHA256ae243556ab9d490c0f9978d48df703740ab0a5ffc3f99d923acda206faa2566e
SHA5120b3f32996686956ba327b134d17f25dbe2ae71dfcb6c0144cd974e4ce054aaa622cb7a093f3fe06bca633578d9b7be41996c9646f9873c79cb17c8bb4f984814
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD540603ee9a465eb9d5eb53ae76f163963
SHA10ca5026a09120f0648a4619f7af3729c05e36a33
SHA256c0edf7ca5a8482805d6f2fcd4e9cb4e165c1ea390e1fbf3c46aca419a221d098
SHA512386d8a94cc263cc76dc24c3ffd5a04f05b346a8f8d1ecc14a2dad54025e017612c06624c22d1667f16a66831d5d24d233c010746cdbc9dcdcc21931b39249d30
-
Filesize
351KB
MD540603ee9a465eb9d5eb53ae76f163963
SHA10ca5026a09120f0648a4619f7af3729c05e36a33
SHA256c0edf7ca5a8482805d6f2fcd4e9cb4e165c1ea390e1fbf3c46aca419a221d098
SHA512386d8a94cc263cc76dc24c3ffd5a04f05b346a8f8d1ecc14a2dad54025e017612c06624c22d1667f16a66831d5d24d233c010746cdbc9dcdcc21931b39249d30