Overview
overview
10Static
static
10Redline St....2.exe
windows10-2004-x64
10Redline St...ck.exe
windows10-2004-x64
10Redline St...ub.exe
windows10-2004-x64
10Redline St...st.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...er.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...ck.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...el.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...ck.exe
windows10-2004-x64
10Redline St...me.exe
windows10-2004-x64
8Redline St...48.exe
windows10-2004-x64
7Redline St...ar.exe
windows10-2004-x64
1Analysis
-
max time kernel
26s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2023 20:27
Behavioral task
behavioral1
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Builder/Kurome.Builder v24.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Builder/Kurome.Builder_crack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Builder/stub.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Host/Kurome.Host.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/._cache_Kurome Loader 20.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/._cache_KuromeLoader.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/Kurome Loader 24.2.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral8
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/Kurome.Loader_crack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/._cache_Panel 20.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/._cache_Panel.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/Panel 24.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/Panel_crack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Tools/Chrome.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Tools/NetFramework48.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Tools/WinRar.exe
Resource
win10v2004-20230220-en
General
-
Target
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Builder/Kurome.Builder v24.2.exe
-
Size
170KB
-
MD5
470a8267b5eba7eb998d9fa69532f849
-
SHA1
1152ddb2ab93aae9983e3e8b5c4f367875323e3e
-
SHA256
6cdb8d1af85d10ed3022ae0a183e3e9dff0ad1bc4a90915e7e41b600154a349e
-
SHA512
5f151230dc97e0804cbe7b36ce9a4570023bdaf0283ae2681732a835c26e540ec93f9c56cd78599c8deeeaed10b2b50f9c976c85ad95d4e36460e05083f7048d
-
SSDEEP
3072:O+STW8djpN6izj8mZwHQiWZqswqIPu/i9b+J2cOZTMi56+WpL:z8XN6W8mmdUwXPSi9b2c3
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6093966625:AAHk4dddHb8B1faCcFqL3um1gmB-f2mWhyc/sendMessage?chat_id=5529838804
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1488-133-0x0000000000B70000-0x0000000000BA0000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1488-133-0x0000000000B70000-0x0000000000BA0000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Kurome.Builder v24.2.exe File opened for modification C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Kurome.Builder v24.2.exe File created C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Kurome.Builder v24.2.exe File created C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini Kurome.Builder v24.2.exe File created C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Kurome.Builder v24.2.exe File created C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini Kurome.Builder v24.2.exe File created C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini Kurome.Builder v24.2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1488 Kurome.Builder v24.2.exe 1488 Kurome.Builder v24.2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1488 Kurome.Builder v24.2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Kurome.Builder\Kurome.Builder v24.2.exe"C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Kurome.Builder\Kurome.Builder v24.2.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵PID:2060
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2228
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:2260
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:1676
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2836
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:464
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\System\Process.txt
Filesize4KB
MD5cda2261478f1525f1427da93391a78ef
SHA17731ba4b88179719c13aa3bfd7ea4a8638980f3a
SHA2563a542bd72f931e6ea085aefdc9c9e3913088e3a35dff6ab9983c12e6359ae9e0
SHA5124ba676b63ae22b3bfe706582902da7b7370494d9148e2b64bf6142e715617ec0e882472d1a02faf69621e4e515d6c26f8f928c7db976eccf723da0e45889dff3