Analysis
-
max time kernel
3s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 15:22
Behavioral task
behavioral1
Sample
1bz7KfahvU.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1bz7KfahvU.exe
Resource
win10v2004-20230220-en
General
-
Target
1bz7KfahvU.exe
-
Size
5.4MB
-
MD5
e0d2634fe2b085685f0b71e66ac91ec9
-
SHA1
c03d6b2218ffff1957a91f64d15ee1cbb57726fd
-
SHA256
24c485ecb00d9d6ed8c12fb7a3162169cb1b666ab9a90eb3c1bcdf8dd8c40df4
-
SHA512
48e72eccb385e282b419fe7116d6a0c7c0a6cd5ca482e57ae7b1b52440e347833d0aa9c15097bdeec8074b9a60d90843a5d4f20e4ce9d0595f3dc0a38b6fdde8
-
SSDEEP
49152:pyWMOEmrU4VWLP6zev05oej0EL9gCegK/efy5d8A45EG273LCV0UOQJUh9q101GF:Eq6PQn4/9GEp32VLV+h9sF
Malware Config
Extracted
aurora
167.235.58.189:456
Signatures
-
Detects Redline Stealer samples 5 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral1/memory/1976-60-0x000000001B180000-0x000000001B462000-memory.dmp redline_stealer behavioral1/memory/1976-63-0x0000000002830000-0x00000000028B0000-memory.dmp redline_stealer behavioral1/memory/1976-65-0x0000000002830000-0x00000000028B0000-memory.dmp redline_stealer behavioral1/memory/520-73-0x000000001B2F0000-0x000000001B5D2000-memory.dmp redline_stealer behavioral1/memory/1224-87-0x0000000002690000-0x0000000002710000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1bz7KfahvU.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\runtime_1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\config\\runtime.exe" 1bz7KfahvU.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1980 schtasks.exe 852 schtasks.exe 664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1976 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1976 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1bz7KfahvU.exedescription pid process target process PID 2024 wrote to memory of 1976 2024 1bz7KfahvU.exe powershell.exe PID 2024 wrote to memory of 1976 2024 1bz7KfahvU.exe powershell.exe PID 2024 wrote to memory of 1976 2024 1bz7KfahvU.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bz7KfahvU.exe"C:\Users\Admin\AppData\Local\Temp\1bz7KfahvU.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_1 /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_1 /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_2 /TR C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe"2⤵
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_2 /TR C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_3 /TR C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe"2⤵
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_3 /TR C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {88DC03B5-C2D3-4DC5-92D1-66B6510C348E} S-1-5-21-1563773381-2037468142-1146002597-1000:YBHADZIG\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid1⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
17.2MB
MD5698a878bdd5ecb8d7455acccdc5cb4ac
SHA1ba4c51377893af95c2ccd09addb24b8e5d0262d9
SHA2568235f1401129730a45213d833299d4e21426b2091b62a9439baec07011ac7ab6
SHA51263c4625df751d692de84f0339ac11f8421fafc2b2fa60c1775767e5cc38ffd46156daa6d7087484eb414f8ebc2de8c1ee0e4ede09e83e38d9ab6ea8134ea1ac7
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
26.6MB
MD57957a95d068948879114444b0c015fd0
SHA1c50e3f38dd3b0624bb56df27f43e513280fa3857
SHA256f0dcfbda2bb6dac28781602d2fbef1d8ec573e2d5ab4ce29e3a5c2c22eb6d388
SHA5128a33e82fb13fea0e34e4319d9b462f8ced8b5b3a72c9b087ebde8e3dbbb873cf04e68c6e6fe8ae91e7021bb64385bffc5d7a2ddc26328f6ddb00ca2ff2777dfa
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
28.4MB
MD5303910efa1020cda295969a3455722af
SHA1c668f7819d0086f1d6a44076acfbfe118982edd9
SHA256ffd560df062ca6285d232253fad991c3b5ecb01ed03836f1e4fa4d75e8ba86bf
SHA5129f1171dd318c6dbd08fff528ed6c89ddbe9c9065cc505e5e15f451c76dc34d76b0b692c73c0a666f444ee7e05b301dd189b04271a30de3ad9d2f9dfed1dba0a9
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
15.5MB
MD507437f816830b0e6726a3e0717abedb3
SHA1e9a0d7add8a9aeaf3c6d79b8208b672934a99ad9
SHA256e2440eb5e65e50aef556037fc8fda7239a9240f502c1179c5ac21349ab21c267
SHA5122f0b5db7bd30a9d2d5031af7411ee060d35f96d986c1d8bcc76542c805037e7d6ba98fba5b3e046763df1443423db381bd2dc8b156c2519fc2b9e8a2edb5c13b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
42.1MB
MD5097e77b327ae51ae44b74af9eaaad8a6
SHA162596abba624468cc29ef56f14472e76a249924a
SHA256760eb85520571c11a55679b17a4fe6af58d2d19815fa99e5b9e3258489145c65
SHA512bc2fe0f3ecec7fc830c1eda28508a4a10f900e2f2ca91c450da2430f88cbfa05d78bc93017139b4cbe194188c7c6c41196b9406396bca8dc28f105d257178db6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
27.4MB
MD5d120b4737e39cb16ec4f10271d3cccb5
SHA1b710956d314104e599fc7c96d2d18a5d8c6e99f7
SHA25632677290b634963787982c032b356d405b9ce3a374e889ca6ac111f05a3a14e2
SHA5129751280fc89f48dcb62898a20384e5a92531bceb688a5d8f2f34abecf43c5985ae83c7056e4254d8d00d5461b4c10c00bb37a2d98fe72051d0818ee34a37ab7e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
27.6MB
MD561d6f1b0179d032c943209489b6e63ad
SHA152b2368dc0c10f633002aef17806899cef039c21
SHA2565da40a9e6c7555e9f54e356ce3ccbcf5ff7c58becdd6386d003de7cea1258b3d
SHA512c0a56fa4929853234fbeb8d83bdca122e2aa0b6f9f53264569eeb7da14449f9e2657660e63d62c1fe3e98ba2d6555039e08731e8d09ef95aa2210b294ed45e0e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD51594103034120a391ef568a8460b70e5
SHA1db0c05578c6582328e3943d1ff55312da590df9e
SHA2567abd6c123615b8fb20d23893dd979871e505afaae86fbf862761ea823e38b330
SHA5125c504ded92be098087197760945924b489fb24e65aa4b2abd3fba16c142d1117fba1ed6ccc34e18c3badc7132bc93c89d0624497b2d39ba6a13cc06e6efd8e50
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD51594103034120a391ef568a8460b70e5
SHA1db0c05578c6582328e3943d1ff55312da590df9e
SHA2567abd6c123615b8fb20d23893dd979871e505afaae86fbf862761ea823e38b330
SHA5125c504ded92be098087197760945924b489fb24e65aa4b2abd3fba16c142d1117fba1ed6ccc34e18c3badc7132bc93c89d0624497b2d39ba6a13cc06e6efd8e50
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z8ILURJ8RO1PZRCB3NCK.tempFilesize
7KB
MD51594103034120a391ef568a8460b70e5
SHA1db0c05578c6582328e3943d1ff55312da590df9e
SHA2567abd6c123615b8fb20d23893dd979871e505afaae86fbf862761ea823e38b330
SHA5125c504ded92be098087197760945924b489fb24e65aa4b2abd3fba16c142d1117fba1ed6ccc34e18c3badc7132bc93c89d0624497b2d39ba6a13cc06e6efd8e50
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
26.4MB
MD5614aecad6d7783062063ea9964c391f7
SHA1b6d53c4b0b457e3b1ad69c876a3a613a842fc47c
SHA2563881356ed08ca5cffac34911679de030e69dd54ff2dffbafef317a0a5d59ce35
SHA5121416111c4a81d24e75fb1a880a838831ec40551af26ae6a2ba20dccc1b7cd80d0d772bd925e69c42883dd754f44d63b73bd6876262c982d539f197ec6f01f875
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
15.9MB
MD54b9f6afc0672ef10a425f7dd6fcb7d81
SHA1a2a4996e3e5df50008c62905685b934d1f3259a0
SHA2561acc567a33b2d3c48800eca41381a64c0f18614d8be2df1ef73027783c3826cd
SHA512c2837362aeba1dca59582c73ca6b97a8f4409ae7ee936695edacaa2fa1b39b73a86d7ec66aec89b00c8b8ceb7278fa16dd361b7ff55acde69ac8c77617c27044
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
27.9MB
MD51d995267495e20bafc28219c9b01afdf
SHA1f47a966b0e68dac473a41595aa89935cda2be433
SHA25614fdf3e409d9ac49aa136486d172e24e959d2cc64c4e8c3e76dd87d59a956cd6
SHA512bc89d5d857bf8fbcc3fe115143c0c252228c7af6648478b6c209f6b62014c8273ace71895528b73783c5bd85dc8c0d2275dd3969b0461f07fe12fd4dce9a2257
-
\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
16.5MB
MD5c9b30c4ad01b5fd7f09a5298db41911b
SHA1a8acf163c8d8b607809f654e62f07f1bf019f7ab
SHA256c62ecb4c4b23e04d881b09cf67c5a9ce39b9b4d7018cb0120d12430ce037e67b
SHA5127ce73fe3d0fd85d4c4b739c35b9ce974c66e2a70ffbda24baffbeca32f05bcd6fb7da4c797738e56a4b2555c3ce167d771ee9b56258580790e2e82393c5b7572
-
\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
27.9MB
MD559d19b971e384c9cca55edba2a86fc27
SHA1a8a2cd96e51008c767818ae37f48441cdf037efb
SHA25606338a3c6df3999e9ef11de61df414bf40ca2bf067e4f55392d620a5cdce705d
SHA512e59841e8f50a2d3b140a2c7a286db65fd07647d250a025bd8e26c196cd41163d2db884553e6b84408e10b03ab42b720710ab77060960ce1454370cfbab7d5471
-
\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
25.9MB
MD5cf9474e9ee1af0a8f064047e4f8c9099
SHA19d9f9e5eb4238f8b7cde8871c5173434731b7c32
SHA2567c03508a02f4e29afa5aaa4a2170bfb54b344a458e9424da2f438816234d5a51
SHA51210dbfe30992e958d1abbf14feae283d68338d47debb31c1050c6a17040e91912fcc21e0941adb4ed55d234f67c15974a45ce8cdbffd55fc744aed20e141cbc05
-
\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
16.2MB
MD57af29b2e97a07ca0b0737e52f9a51d70
SHA15bb1e6a80c00e4c1c9b03278f4d397f7f3a937fd
SHA25634c8281a9d7dc9c4a035e7a624a805ac767593edeb63d52e5fb0ef0efac1aed8
SHA512b7f20f1bfbe1ee5ad158f459966bc734fbba54cf7b823f15fd777d754bbd558a3728286d8bafa5ec791881f84192061feefb0cf886964e9cb2a9b7e66eb16184
-
\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
17.0MB
MD5c8506a4068e8e2310683c0f2102b93a8
SHA1a7e67dbcaff48128922c1bd020b5bfaa2152cc55
SHA25677609bea44b4d3a652f609068acbe0e6ba83a02bf7a31c8ec66cd402e8240be0
SHA512079ef2a13c4fbb58974bfb9a1a45a78fba1c608f2842ec5cc4203e6beac364178e3072722e9d12a498ba9e966853414111eb4230272f7c661611eeae09a399b6
-
\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
26.9MB
MD5c4e4d2e168471bd70e7988fdae49c70a
SHA16833f0f208bea2d64146eb6ed5ae9a2fb01f50e8
SHA2567f301b791a4c8c3148617ac0d311b8d693ccab032ed2a751597c03430442b3de
SHA512c840110b404cfa273379070a5b6225269c172c83544eef637b54c25c4429edda9f7a7395ecc641b27f4c7470f21bef01e22d743351f67861327710cc58042f84
-
\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
27.6MB
MD52ccd727b2b35751f0e4adc3e9b0c48ff
SHA11abfb6ce1358d9d9a878b64becd49d7a9f4091dd
SHA2563276cb274c8a9706bbd4a925c91af344d73e4f8b51c5d45f0d0ccaea45fd8eb3
SHA512254f66d1c247697985e7a82041ea318e23913b67def22ff33b35b64f522df399be8a376abf028d11380d793b1cc1dc2346d01ff89268dad806d2c6c6603206fc
-
\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
16.0MB
MD5b10a9acec9c82eb21c6d69db5e7a358d
SHA1d5da4834838bc7cf44ec3ad6c8fc9d0cecda52f8
SHA256ed66f8460e2a093e15c06f2d160c01f66ca475d68d97de1a1d43cb836b7ba098
SHA51242ec95f62f5a043c4e6727ba00b782c3dc220074abdcd3fb2f5526f2abd6503f016a9817c4724a03cdbfa443446c4d3085766584cd51223603bd34c489979268
-
\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
27.4MB
MD5d120b4737e39cb16ec4f10271d3cccb5
SHA1b710956d314104e599fc7c96d2d18a5d8c6e99f7
SHA25632677290b634963787982c032b356d405b9ce3a374e889ca6ac111f05a3a14e2
SHA5129751280fc89f48dcb62898a20384e5a92531bceb688a5d8f2f34abecf43c5985ae83c7056e4254d8d00d5461b4c10c00bb37a2d98fe72051d0818ee34a37ab7e
-
\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
26.9MB
MD5c4e4d2e168471bd70e7988fdae49c70a
SHA16833f0f208bea2d64146eb6ed5ae9a2fb01f50e8
SHA2567f301b791a4c8c3148617ac0d311b8d693ccab032ed2a751597c03430442b3de
SHA512c840110b404cfa273379070a5b6225269c172c83544eef637b54c25c4429edda9f7a7395ecc641b27f4c7470f21bef01e22d743351f67861327710cc58042f84
-
memory/520-73-0x000000001B2F0000-0x000000001B5D2000-memory.dmpFilesize
2.9MB
-
memory/520-75-0x0000000002730000-0x00000000027B0000-memory.dmpFilesize
512KB
-
memory/520-74-0x00000000022E0000-0x00000000022E8000-memory.dmpFilesize
32KB
-
memory/520-77-0x0000000002730000-0x00000000027B0000-memory.dmpFilesize
512KB
-
memory/520-76-0x0000000002730000-0x00000000027B0000-memory.dmpFilesize
512KB
-
memory/1224-88-0x0000000002690000-0x0000000002710000-memory.dmpFilesize
512KB
-
memory/1224-85-0x0000000002690000-0x0000000002710000-memory.dmpFilesize
512KB
-
memory/1224-87-0x0000000002690000-0x0000000002710000-memory.dmpFilesize
512KB
-
memory/1224-86-0x0000000002690000-0x0000000002710000-memory.dmpFilesize
512KB
-
memory/1976-60-0x000000001B180000-0x000000001B462000-memory.dmpFilesize
2.9MB
-
memory/1976-62-0x0000000002830000-0x00000000028B0000-memory.dmpFilesize
512KB
-
memory/1976-64-0x0000000002830000-0x00000000028B0000-memory.dmpFilesize
512KB
-
memory/1976-65-0x0000000002830000-0x00000000028B0000-memory.dmpFilesize
512KB
-
memory/1976-63-0x0000000002830000-0x00000000028B0000-memory.dmpFilesize
512KB
-
memory/1976-61-0x0000000002240000-0x0000000002248000-memory.dmpFilesize
32KB