Analysis
-
max time kernel
146s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:17
Static task
static1
Behavioral task
behavioral1
Sample
c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe
Resource
win10v2004-20230220-en
General
-
Target
c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe
-
Size
1.2MB
-
MD5
02d03ae36069b971df04ac11550cc22f
-
SHA1
84ec96b83c2ed70f1277790201d96eb69185bf9d
-
SHA256
c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a
-
SHA512
ac0c7260fb2ba5e86dd932d9ba51d28c20dad951a21de8f1fab1f5353ec0b6d2309afaf6c7b11afd9912e0cb1cfc0793014dea39a0f807820a9eea70fe473516
-
SSDEEP
24576:6yfwlNZmka+KvlNbKUd3/eU8BYzbr2Y2GOVH/f:BfANZ2HW82tBwXnXiH/
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/3368-2332-0x000000000AD10000-0x000000000B328000-memory.dmp redline_stealer behavioral2/memory/2756-2349-0x0000000005610000-0x0000000005676000-memory.dmp redline_stealer behavioral2/memory/3368-2352-0x000000000BFD0000-0x000000000C192000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s09543558.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation s09543558.exe -
Executes dropped EXE 6 IoCs
Processes:
z59424173.exez34446665.exez91108685.exes09543558.exe1.exet07759713.exepid process 1912 z59424173.exe 3836 z34446665.exe 1436 z91108685.exe 1532 s09543558.exe 3368 1.exe 2756 t07759713.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exez59424173.exez34446665.exez91108685.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z59424173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z59424173.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z34446665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z34446665.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z91108685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z91108685.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4572 1532 WerFault.exe s09543558.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s09543558.exedescription pid process Token: SeDebugPrivilege 1532 s09543558.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exez59424173.exez34446665.exez91108685.exes09543558.exedescription pid process target process PID 832 wrote to memory of 1912 832 c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe z59424173.exe PID 832 wrote to memory of 1912 832 c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe z59424173.exe PID 832 wrote to memory of 1912 832 c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe z59424173.exe PID 1912 wrote to memory of 3836 1912 z59424173.exe z34446665.exe PID 1912 wrote to memory of 3836 1912 z59424173.exe z34446665.exe PID 1912 wrote to memory of 3836 1912 z59424173.exe z34446665.exe PID 3836 wrote to memory of 1436 3836 z34446665.exe z91108685.exe PID 3836 wrote to memory of 1436 3836 z34446665.exe z91108685.exe PID 3836 wrote to memory of 1436 3836 z34446665.exe z91108685.exe PID 1436 wrote to memory of 1532 1436 z91108685.exe s09543558.exe PID 1436 wrote to memory of 1532 1436 z91108685.exe s09543558.exe PID 1436 wrote to memory of 1532 1436 z91108685.exe s09543558.exe PID 1532 wrote to memory of 3368 1532 s09543558.exe 1.exe PID 1532 wrote to memory of 3368 1532 s09543558.exe 1.exe PID 1532 wrote to memory of 3368 1532 s09543558.exe 1.exe PID 1436 wrote to memory of 2756 1436 z91108685.exe t07759713.exe PID 1436 wrote to memory of 2756 1436 z91108685.exe t07759713.exe PID 1436 wrote to memory of 2756 1436 z91108685.exe t07759713.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe"C:\Users\Admin\AppData\Local\Temp\c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 11966⤵
- Program crash
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe5⤵
- Executes dropped EXE
PID:2756
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1532 -ip 15321⤵PID:4372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c2c00a7c9accb61421f2ab9552fd41a0
SHA1cbb44923579d7533d643f7c6038f0c6acd705c98
SHA256482c4049761dae703e22779a6e4bc41c29126e256922dffe7450f47ee73a3726
SHA512bc45fd4e337247264def402b63792da62dc8d9b96b8111d8d1c955d82c1363ce2935a4a4a0d0c0a1c173d145e55d1162f2e6df0e4d7966aec899c0298c92195d
-
Filesize
1.0MB
MD5c2c00a7c9accb61421f2ab9552fd41a0
SHA1cbb44923579d7533d643f7c6038f0c6acd705c98
SHA256482c4049761dae703e22779a6e4bc41c29126e256922dffe7450f47ee73a3726
SHA512bc45fd4e337247264def402b63792da62dc8d9b96b8111d8d1c955d82c1363ce2935a4a4a0d0c0a1c173d145e55d1162f2e6df0e4d7966aec899c0298c92195d
-
Filesize
759KB
MD539ec0614da175b159d66805ba08e4bda
SHA1c3801fb2fe1ba35e1740192e2ec7b2385c50934c
SHA256b5ad6e7d4d75a363ef2cbde6ddbb7f9b2e1928ad0b4fee46cb375b5170dcf130
SHA51255b1d2e037da65eb747328716dd9cdf602c080312989a66ce0de6174ee35aee593dfedb4b8c7e8ed94eab8329373b1a547553108016ee560ca23340fc2a4f110
-
Filesize
759KB
MD539ec0614da175b159d66805ba08e4bda
SHA1c3801fb2fe1ba35e1740192e2ec7b2385c50934c
SHA256b5ad6e7d4d75a363ef2cbde6ddbb7f9b2e1928ad0b4fee46cb375b5170dcf130
SHA51255b1d2e037da65eb747328716dd9cdf602c080312989a66ce0de6174ee35aee593dfedb4b8c7e8ed94eab8329373b1a547553108016ee560ca23340fc2a4f110
-
Filesize
577KB
MD5f9d79cd098fea81785b6c752f9cf6ebc
SHA165917605327e9365c6e5b52c0d6da193aee4cb62
SHA25679998aec9813abb428fd4e9b29d41126572f8edac6d6e855e812bae0ae4b2d05
SHA5122d64508844320d50863d124f725fd1ddefa2701a6442fb14fbd80788c9832ca626ab0ae0fc0935319b3b926827b99b5af311a7e0543a30f4dc12e9e86552e668
-
Filesize
577KB
MD5f9d79cd098fea81785b6c752f9cf6ebc
SHA165917605327e9365c6e5b52c0d6da193aee4cb62
SHA25679998aec9813abb428fd4e9b29d41126572f8edac6d6e855e812bae0ae4b2d05
SHA5122d64508844320d50863d124f725fd1ddefa2701a6442fb14fbd80788c9832ca626ab0ae0fc0935319b3b926827b99b5af311a7e0543a30f4dc12e9e86552e668
-
Filesize
574KB
MD5b187e416287b0666f4fb9037c0a129f3
SHA187edfba923c3f8eb89390380aa7caa933699cff4
SHA256d093a468655a958fe7e395262e0ff1625b4629b9b73daa475faa3a4d01df6b9f
SHA512f74a0ad3e3d0f5d1ee7f67d3904c707b6ec38ecea68a4ccaf910f0db13a20b0fc923392e3dc100fe00395488f33c805fd9436dc8e91cfbff68b4bf243c59a66e
-
Filesize
574KB
MD5b187e416287b0666f4fb9037c0a129f3
SHA187edfba923c3f8eb89390380aa7caa933699cff4
SHA256d093a468655a958fe7e395262e0ff1625b4629b9b73daa475faa3a4d01df6b9f
SHA512f74a0ad3e3d0f5d1ee7f67d3904c707b6ec38ecea68a4ccaf910f0db13a20b0fc923392e3dc100fe00395488f33c805fd9436dc8e91cfbff68b4bf243c59a66e
-
Filesize
169KB
MD5df3ea32a62bef18913a5e557b8dfdb06
SHA12e9e8c332386e069981799515e552d6d780684f4
SHA256138ed3de3a592c71feaf3ebef227948674ce20a4c3aae7ba4a539e8b0a3a444e
SHA512984b826bb7867151afaba229ea76dad757c82d243b67cfba2ce9e69d30fcc08d629cf901ed39c13170a79f72021fe12cc6f0fac9bb566a861d8d0f1366d2044e
-
Filesize
169KB
MD5df3ea32a62bef18913a5e557b8dfdb06
SHA12e9e8c332386e069981799515e552d6d780684f4
SHA256138ed3de3a592c71feaf3ebef227948674ce20a4c3aae7ba4a539e8b0a3a444e
SHA512984b826bb7867151afaba229ea76dad757c82d243b67cfba2ce9e69d30fcc08d629cf901ed39c13170a79f72021fe12cc6f0fac9bb566a861d8d0f1366d2044e
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf