Analysis

  • max time kernel
    27s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 20:27

General

  • Target

    Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/Panel 24.2.exe

  • Size

    923KB

  • MD5

    ad5e1454eb96c012755dcab90cfd69cf

  • SHA1

    17f93458b223542eed1c269d9c64b8c39341b1cd

  • SHA256

    726725262283f68ec3e3f62d13863c7df9b08f54e19c28603407d98631468494

  • SHA512

    1f503e6619ff5cd87838b4618400ae54c24d5f618813cfd8ce7ecdd53f25d74186dda096a1a2ab49848184e22137c05de0fbf010a0ccc9adcc5b58e727da1d46

  • SSDEEP

    12288:0MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Z0N6qsUwXPDgj:0nsJ39LyjbJkQFMhmC+6GD9UaE

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6093966625:AAHk4dddHb8B1faCcFqL3um1gmB-f2mWhyc/sendMessage?chat_id=5529838804

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 11 IoCs
  • Async RAT payload 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\Panel 24.2.exe
    "C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\Panel 24.2.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Panel 24.2.exe
      "C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Panel 24.2.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2524
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
          PID:4224
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            4⤵
              PID:3048
            • C:\Windows\SysWOW64\findstr.exe
              findstr All
              4⤵
                PID:564
              • C:\Windows\SysWOW64\netsh.exe
                netsh wlan show profile
                4⤵
                  PID:4672
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                3⤵
                  PID:4904
                  • C:\Windows\SysWOW64\chcp.com
                    chcp 65001
                    4⤵
                      PID:4216
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh wlan show networks mode=bssid
                      4⤵
                        PID:676
                  • C:\ProgramData\Synaptics\Synaptics.exe
                    "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                    2⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4808
                    • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Synaptics.exe
                      "C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Synaptics.exe" InjUpdate
                      3⤵
                      • Executes dropped EXE
                      • Drops desktop.ini file(s)
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4124
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 1392
                        4⤵
                        • Program crash
                        PID:704
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4124 -ip 4124
                  1⤵
                    PID:2868

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\Synaptics\Synaptics.exe
                    Filesize

                    923KB

                    MD5

                    ad5e1454eb96c012755dcab90cfd69cf

                    SHA1

                    17f93458b223542eed1c269d9c64b8c39341b1cd

                    SHA256

                    726725262283f68ec3e3f62d13863c7df9b08f54e19c28603407d98631468494

                    SHA512

                    1f503e6619ff5cd87838b4618400ae54c24d5f618813cfd8ce7ecdd53f25d74186dda096a1a2ab49848184e22137c05de0fbf010a0ccc9adcc5b58e727da1d46

                  • C:\ProgramData\Synaptics\Synaptics.exe
                    Filesize

                    923KB

                    MD5

                    ad5e1454eb96c012755dcab90cfd69cf

                    SHA1

                    17f93458b223542eed1c269d9c64b8c39341b1cd

                    SHA256

                    726725262283f68ec3e3f62d13863c7df9b08f54e19c28603407d98631468494

                    SHA512

                    1f503e6619ff5cd87838b4618400ae54c24d5f618813cfd8ce7ecdd53f25d74186dda096a1a2ab49848184e22137c05de0fbf010a0ccc9adcc5b58e727da1d46

                  • C:\ProgramData\Synaptics\Synaptics.exe
                    Filesize

                    923KB

                    MD5

                    ad5e1454eb96c012755dcab90cfd69cf

                    SHA1

                    17f93458b223542eed1c269d9c64b8c39341b1cd

                    SHA256

                    726725262283f68ec3e3f62d13863c7df9b08f54e19c28603407d98631468494

                    SHA512

                    1f503e6619ff5cd87838b4618400ae54c24d5f618813cfd8ce7ecdd53f25d74186dda096a1a2ab49848184e22137c05de0fbf010a0ccc9adcc5b58e727da1d46

                  • C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini
                    Filesize

                    402B

                    MD5

                    ecf88f261853fe08d58e2e903220da14

                    SHA1

                    f72807a9e081906654ae196605e681d5938a2e6c

                    SHA256

                    cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844

                    SHA512

                    82c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b

                  • C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini
                    Filesize

                    282B

                    MD5

                    3a37312509712d4e12d27240137ff377

                    SHA1

                    30ced927e23b584725cf16351394175a6d2a9577

                    SHA256

                    b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3

                    SHA512

                    dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05

                  • C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini
                    Filesize

                    190B

                    MD5

                    d48fce44e0f298e5db52fd5894502727

                    SHA1

                    fce1e65756138a3ca4eaaf8f7642867205b44897

                    SHA256

                    231a08caba1f9ba9f14bd3e46834288f3c351079fcedda15e391b724ac0c7ea8

                    SHA512

                    a1c0378db4e6dac9a8638586f6797bad877769d76334b976779cd90324029d755fb466260ef27bd1e7f9fdf97696cd8cd1318377970a1b5bf340efb12a4feb4a

                  • C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini
                    Filesize

                    190B

                    MD5

                    87a524a2f34307c674dba10708585a5e

                    SHA1

                    e0508c3f1496073b9f6f9ecb2fb01cb91f9e8201

                    SHA256

                    d01a7ef6233ef4ab3ea7210c0f2837931d334a20ae4d2a05ed03291e59e576c9

                    SHA512

                    7cfa6d47190075e1209fb081e36ed7e50e735c9682bfb482dbf5a36746abdad0dccfdb8803ef5042e155e8c1f326770f3c8f7aa32ce66cf3b47cd13781884c38

                  • C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini
                    Filesize

                    504B

                    MD5

                    29eae335b77f438e05594d86a6ca22ff

                    SHA1

                    d62ccc830c249de6b6532381b4c16a5f17f95d89

                    SHA256

                    88856962cef670c087eda4e07d8f78465beeabb6143b96bd90f884a80af925b4

                    SHA512

                    5d2d05403b39675b9a751c8eed4f86be58cb12431afec56946581cb116b9ae1014ab9334082740be5b4de4a25e190fe76de071ef1b9074186781477919eb3c17

                  • C:\Users\Admin\AppData\Local\19476dd635480f724e061f795c59f978\Admin@WEYPCEWN_en-US\System\Process.txt
                    Filesize

                    4KB

                    MD5

                    a56a4e90f15f7ab8a992facc6f4c1e42

                    SHA1

                    fdfa39b9f200b8deff2229f0b87fee498ef32022

                    SHA256

                    071cf5acb16dd33593f5bb41e1d7f820f8d6358d76d88aa0eecb0e6267b25ad9

                    SHA512

                    ff019e0fdfb7fe6959121fafcbc8442340fb96e1a5ff01ed19b2154e752b7382a6feae43e87ac5f8f56a057b68ab1f00b4ccb965689ea0147c5c9c2888776673

                  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Panel 24.2.exe
                    Filesize

                    170KB

                    MD5

                    470a8267b5eba7eb998d9fa69532f849

                    SHA1

                    1152ddb2ab93aae9983e3e8b5c4f367875323e3e

                    SHA256

                    6cdb8d1af85d10ed3022ae0a183e3e9dff0ad1bc4a90915e7e41b600154a349e

                    SHA512

                    5f151230dc97e0804cbe7b36ce9a4570023bdaf0283ae2681732a835c26e540ec93f9c56cd78599c8deeeaed10b2b50f9c976c85ad95d4e36460e05083f7048d

                  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Panel 24.2.exe
                    Filesize

                    170KB

                    MD5

                    470a8267b5eba7eb998d9fa69532f849

                    SHA1

                    1152ddb2ab93aae9983e3e8b5c4f367875323e3e

                    SHA256

                    6cdb8d1af85d10ed3022ae0a183e3e9dff0ad1bc4a90915e7e41b600154a349e

                    SHA512

                    5f151230dc97e0804cbe7b36ce9a4570023bdaf0283ae2681732a835c26e540ec93f9c56cd78599c8deeeaed10b2b50f9c976c85ad95d4e36460e05083f7048d

                  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Panel 24.2.exe
                    Filesize

                    170KB

                    MD5

                    470a8267b5eba7eb998d9fa69532f849

                    SHA1

                    1152ddb2ab93aae9983e3e8b5c4f367875323e3e

                    SHA256

                    6cdb8d1af85d10ed3022ae0a183e3e9dff0ad1bc4a90915e7e41b600154a349e

                    SHA512

                    5f151230dc97e0804cbe7b36ce9a4570023bdaf0283ae2681732a835c26e540ec93f9c56cd78599c8deeeaed10b2b50f9c976c85ad95d4e36460e05083f7048d

                  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Synaptics.exe
                    Filesize

                    170KB

                    MD5

                    470a8267b5eba7eb998d9fa69532f849

                    SHA1

                    1152ddb2ab93aae9983e3e8b5c4f367875323e3e

                    SHA256

                    6cdb8d1af85d10ed3022ae0a183e3e9dff0ad1bc4a90915e7e41b600154a349e

                    SHA512

                    5f151230dc97e0804cbe7b36ce9a4570023bdaf0283ae2681732a835c26e540ec93f9c56cd78599c8deeeaed10b2b50f9c976c85ad95d4e36460e05083f7048d

                  • C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Panel\RedLine_24_2\Panel\._cache_Synaptics.exe
                    Filesize

                    170KB

                    MD5

                    470a8267b5eba7eb998d9fa69532f849

                    SHA1

                    1152ddb2ab93aae9983e3e8b5c4f367875323e3e

                    SHA256

                    6cdb8d1af85d10ed3022ae0a183e3e9dff0ad1bc4a90915e7e41b600154a349e

                    SHA512

                    5f151230dc97e0804cbe7b36ce9a4570023bdaf0283ae2681732a835c26e540ec93f9c56cd78599c8deeeaed10b2b50f9c976c85ad95d4e36460e05083f7048d

                  • memory/564-264-0x0000000000400000-0x00000000004ED000-memory.dmp
                    Filesize

                    948KB

                  • memory/564-133-0x0000000002260000-0x0000000002261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2524-326-0x0000000004A20000-0x0000000004A86000-memory.dmp
                    Filesize

                    408KB

                  • memory/2524-324-0x0000000004A10000-0x0000000004A20000-memory.dmp
                    Filesize

                    64KB

                  • memory/2524-251-0x00000000000C0000-0x00000000000F0000-memory.dmp
                    Filesize

                    192KB

                  • memory/2524-484-0x0000000004A10000-0x0000000004A20000-memory.dmp
                    Filesize

                    64KB

                  • memory/2524-483-0x0000000005850000-0x00000000058E2000-memory.dmp
                    Filesize

                    584KB

                  • memory/2524-485-0x0000000005EA0000-0x0000000006444000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/2524-489-0x0000000005970000-0x000000000597A000-memory.dmp
                    Filesize

                    40KB

                  • memory/4124-325-0x0000000005480000-0x0000000005490000-memory.dmp
                    Filesize

                    64KB

                  • memory/4124-411-0x0000000005480000-0x0000000005490000-memory.dmp
                    Filesize

                    64KB

                  • memory/4808-266-0x0000000002230000-0x0000000002231000-memory.dmp
                    Filesize

                    4KB

                  • memory/4808-391-0x0000000000400000-0x00000000004ED000-memory.dmp
                    Filesize

                    948KB

                  • memory/4808-392-0x0000000002230000-0x0000000002231000-memory.dmp
                    Filesize

                    4KB