Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-04-2023 15:39

General

  • Target

    Redline Stealer v24.2 cracked [XT_CH]/Kurome.Host/Kurome.Host.exe

  • Size

    1.4MB

  • MD5

    b141f114ecbfd918e995d5b40cc4309a

  • SHA1

    403ed39ba990caf4fc82672257875e58ed3a9c3f

  • SHA256

    c11a53f5cdd9d41b754e8cdb8132b7c13f224359302dbb8a4bd9502271feafbe

  • SHA512

    9f2fcef0f8d330d3d7615e642b351bb53da4679df64ee6cc937dd50cdbb318afecca2b56ad2b2a93a9cd6ae41d8e3dfcbc5f876c83f88ec13bc9cef49448315b

  • SSDEEP

    24576:loJEKZ6IEGTMxapRl2PSwHTehy6BP+pXShToJEKZ6IEGTMxapRl2PSwHTehy6BPk:louKZ6iMqRl2PSwzehy6cpXShTouKZ6x

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://thisisgenk.temp.swtest.ru

Extracted

Family

pandastealer

Version

C2

http://�

Signatures

  • Panda Stealer payload 6 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Kurome.Host\Kurome.Host.exe
    "C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Kurome.Host\Kurome.Host.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4916
    • C:\Users\Admin\AppData\Local\Temp\Kurome.Host.exe
      "C:\Users\Admin\AppData\Local\Temp\Kurome.Host.exe"
      2⤵
      • Executes dropped EXE
      PID:3568

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Kurome.Host.exe
    Filesize

    691KB

    MD5

    d012f21f743803781c23443cae5af637

    SHA1

    a6d20e4e85951090c262f29d7159123a4e4c0cba

    SHA256

    9d005ef806af176d0c715b2ee6f79a7ca5ef1aacd2529d75bf05911522b5bb2b

    SHA512

    dcde9865e1a52b18906cacc38ef8df2e3148819c0217a168df6ee58acb4094ae7e6be52cdffed0e3844c4b7929f375c09ffa7629018f05a1d88fed2be7f5f0fb

  • C:\Users\Admin\AppData\Local\Temp\Kurome.Host.exe
    Filesize

    691KB

    MD5

    d012f21f743803781c23443cae5af637

    SHA1

    a6d20e4e85951090c262f29d7159123a4e4c0cba

    SHA256

    9d005ef806af176d0c715b2ee6f79a7ca5ef1aacd2529d75bf05911522b5bb2b

    SHA512

    dcde9865e1a52b18906cacc38ef8df2e3148819c0217a168df6ee58acb4094ae7e6be52cdffed0e3844c4b7929f375c09ffa7629018f05a1d88fed2be7f5f0fb

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    681KB

    MD5

    43aa2880830859585b3c6a15e915b8db

    SHA1

    6780b3f4d54a43b22223629e14c676addb3ac400

    SHA256

    378f2b1055dd7f1a150e0d86889b9bd3336225e38fc3c8cafb390ebf347ad46d

    SHA512

    6d35bd792aefe5c1b42caae9e50ed66967a74bb476985e17d3a5bc8d6b87111b7bb1af56cb216bff24f056da33bc14c4bddc81fabbfa07d569bab98ec679289d

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    681KB

    MD5

    43aa2880830859585b3c6a15e915b8db

    SHA1

    6780b3f4d54a43b22223629e14c676addb3ac400

    SHA256

    378f2b1055dd7f1a150e0d86889b9bd3336225e38fc3c8cafb390ebf347ad46d

    SHA512

    6d35bd792aefe5c1b42caae9e50ed66967a74bb476985e17d3a5bc8d6b87111b7bb1af56cb216bff24f056da33bc14c4bddc81fabbfa07d569bab98ec679289d

  • memory/3568-131-0x0000000000400000-0x00000000004B4000-memory.dmp
    Filesize

    720KB

  • memory/4196-129-0x0000000000400000-0x0000000000561000-memory.dmp
    Filesize

    1.4MB