Overview
overview
10Static
static
10Redline St....2.exe
windows10-2004-x64
10Redline St...ck.exe
windows10-2004-x64
10Redline St...ub.exe
windows10-2004-x64
10Redline St...st.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...er.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...ck.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...el.exe
windows10-2004-x64
10Redline St....2.exe
windows10-2004-x64
10Redline St...ck.exe
windows10-2004-x64
10Redline St...me.exe
windows10-2004-x64
8Redline St...48.exe
windows10-2004-x64
7Redline St...ar.exe
windows10-2004-x64
1Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2023 20:27
Behavioral task
behavioral1
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Builder/Kurome.Builder v24.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Builder/Kurome.Builder_crack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Builder/stub.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Host/Kurome.Host.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/._cache_Kurome Loader 20.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/._cache_KuromeLoader.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/Kurome Loader 24.2.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral8
Sample
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/Kurome.Loader_crack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/._cache_Panel 20.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/._cache_Panel.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/Panel 24.2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Panel/Panel_crack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Tools/Chrome.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Tools/NetFramework48.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Redline Stealer v24.2 cracked [XT_CH]/Panel/RedLine_24_2/Tools/WinRar.exe
Resource
win10v2004-20230220-en
General
-
Target
Redline Stealer v24.2 cracked [XT_CH]/Kurome.Loader/._cache_Kurome Loader 20.2.exe
-
Size
170KB
-
MD5
470a8267b5eba7eb998d9fa69532f849
-
SHA1
1152ddb2ab93aae9983e3e8b5c4f367875323e3e
-
SHA256
6cdb8d1af85d10ed3022ae0a183e3e9dff0ad1bc4a90915e7e41b600154a349e
-
SHA512
5f151230dc97e0804cbe7b36ce9a4570023bdaf0283ae2681732a835c26e540ec93f9c56cd78599c8deeeaed10b2b50f9c976c85ad95d4e36460e05083f7048d
-
SSDEEP
3072:O+STW8djpN6izj8mZwHQiWZqswqIPu/i9b+J2cOZTMi56+WpL:z8XN6W8mmdUwXPSi9b2c3
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6093966625:AAHk4dddHb8B1faCcFqL3um1gmB-f2mWhyc/sendMessage?chat_id=5529838804
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral5/memory/3280-133-0x0000000000EA0000-0x0000000000ED0000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral5/memory/3280-133-0x0000000000EA0000-0x0000000000ED0000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini ._cache_Kurome Loader 20.2.exe File created C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini ._cache_Kurome Loader 20.2.exe File created C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini ._cache_Kurome Loader 20.2.exe File created C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini ._cache_Kurome Loader 20.2.exe File created C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini ._cache_Kurome Loader 20.2.exe File created C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini ._cache_Kurome Loader 20.2.exe File opened for modification C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini ._cache_Kurome Loader 20.2.exe File opened for modification C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini ._cache_Kurome Loader 20.2.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 ._cache_Kurome Loader 20.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ._cache_Kurome Loader 20.2.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe 3280 ._cache_Kurome Loader 20.2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3280 ._cache_Kurome Loader 20.2.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3280 wrote to memory of 2688 3280 ._cache_Kurome Loader 20.2.exe 90 PID 3280 wrote to memory of 2688 3280 ._cache_Kurome Loader 20.2.exe 90 PID 3280 wrote to memory of 2688 3280 ._cache_Kurome Loader 20.2.exe 90 PID 2688 wrote to memory of 960 2688 cmd.exe 92 PID 2688 wrote to memory of 960 2688 cmd.exe 92 PID 2688 wrote to memory of 960 2688 cmd.exe 92 PID 2688 wrote to memory of 3664 2688 cmd.exe 93 PID 2688 wrote to memory of 3664 2688 cmd.exe 93 PID 2688 wrote to memory of 3664 2688 cmd.exe 93 PID 2688 wrote to memory of 5048 2688 cmd.exe 94 PID 2688 wrote to memory of 5048 2688 cmd.exe 94 PID 2688 wrote to memory of 5048 2688 cmd.exe 94 PID 3280 wrote to memory of 460 3280 ._cache_Kurome Loader 20.2.exe 95 PID 3280 wrote to memory of 460 3280 ._cache_Kurome Loader 20.2.exe 95 PID 3280 wrote to memory of 460 3280 ._cache_Kurome Loader 20.2.exe 95 PID 460 wrote to memory of 3420 460 cmd.exe 97 PID 460 wrote to memory of 3420 460 cmd.exe 97 PID 460 wrote to memory of 3420 460 cmd.exe 97 PID 460 wrote to memory of 5108 460 cmd.exe 98 PID 460 wrote to memory of 5108 460 cmd.exe 98 PID 460 wrote to memory of 5108 460 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Kurome.Loader\._cache_Kurome Loader 20.2.exe"C:\Users\Admin\AppData\Local\Temp\Redline Stealer v24.2 cracked [XT_CH]\Kurome.Loader\._cache_Kurome Loader 20.2.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:960
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:3664
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3420
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:5108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD526e359e83860db1d11b6acca57d8ea88
SHA1eb65e208b715d3b42fc535aebcd8d3e7fb5f2c94
SHA25676ebdb6d45c61ca12e622118cc90939ade672adf7890aa2b246405d4884dd75a
SHA512787ee49bdc47713dda397ed679b55d3ed439005e12af8b309305fb21e0c79a79fa6f065617340ab0c29cc2a815ed2d5bc5150f83cd67da85adeec9cb0d0a76af
-
C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\de17979b2c7a726b20affd7ab588ec25\Admin@TPAVZECK_en-US\System\Process.txt
Filesize4KB
MD5a9616efd1d23664fac80902e9cf6227c
SHA181f152b6f0674f9b359c96e388d482428fe7ebcd
SHA25620c29e437e726d79310d735801ce3eb54ad4744be0504baf9a638c73f295738c
SHA512c8d203ed7df39c00084e7881db025dc8b60c810e9a36f25fe43837b09c504b030bc53359ed5d63c9e8d94d3a0232856ea486d27a4bb6fac5ef6068ee58f97f1b