Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win10v2004-20230220-en
General
-
Target
e88c37f1bb15fcbe857ee8c4d526153f.exe
-
Size
1.9MB
-
MD5
e88c37f1bb15fcbe857ee8c4d526153f
-
SHA1
c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b
-
SHA256
9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f
-
SHA512
8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164
-
SSDEEP
49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe
Malware Config
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/216-157-0x0000000005180000-0x0000000005798000-memory.dmp redline_stealer behavioral2/memory/216-648-0x0000000005E90000-0x0000000005EF6000-memory.dmp redline_stealer behavioral2/memory/216-814-0x0000000006EE0000-0x00000000070A2000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation e88c37f1bb15fcbe857ee8c4d526153f.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation e32Lke3.exe -
Executes dropped EXE 4 IoCs
pid Process 1556 cqb3grs.exe 4092 o02kvf1u.exe 1180 e32Lke3.exe 948 svcservice.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" e32Lke3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1556 set thread context of 216 1556 cqb3grs.exe 85 PID 4092 set thread context of 4172 4092 o02kvf1u.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3916 1556 WerFault.exe 82 868 4092 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 RegSvcs.exe 216 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 216 RegSvcs.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1556 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 82 PID 4588 wrote to memory of 1556 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 82 PID 4588 wrote to memory of 1556 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 82 PID 1556 wrote to memory of 216 1556 cqb3grs.exe 85 PID 1556 wrote to memory of 216 1556 cqb3grs.exe 85 PID 1556 wrote to memory of 216 1556 cqb3grs.exe 85 PID 1556 wrote to memory of 216 1556 cqb3grs.exe 85 PID 1556 wrote to memory of 216 1556 cqb3grs.exe 85 PID 4588 wrote to memory of 4092 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 88 PID 4588 wrote to memory of 4092 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 88 PID 4588 wrote to memory of 4092 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 88 PID 4092 wrote to memory of 4172 4092 o02kvf1u.exe 90 PID 4092 wrote to memory of 4172 4092 o02kvf1u.exe 90 PID 4092 wrote to memory of 4172 4092 o02kvf1u.exe 90 PID 4092 wrote to memory of 4172 4092 o02kvf1u.exe 90 PID 4092 wrote to memory of 4172 4092 o02kvf1u.exe 90 PID 4588 wrote to memory of 1180 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 94 PID 4588 wrote to memory of 1180 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 94 PID 4588 wrote to memory of 1180 4588 e88c37f1bb15fcbe857ee8c4d526153f.exe 94 PID 1180 wrote to memory of 948 1180 e32Lke3.exe 96 PID 1180 wrote to memory of 948 1180 e32Lke3.exe 96 PID 1180 wrote to memory of 948 1180 e32Lke3.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 2803⤵
- Program crash
PID:3916
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 1363⤵
- Program crash
PID:868
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵
- Executes dropped EXE
PID:948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1556 -ip 15561⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4092 -ip 40921⤵PID:4764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
275.2MB
MD59dd4b84a69484eeec42d45534a327452
SHA198d37cfe7d352d5bc29341ab49d3ecdf9b8810aa
SHA2562fe17c7c88df610a29f83100ed45d164a4f3c1fea3de0e5c301b60016b72a3d0
SHA5120b28c7de9ed5c74e146d59093bd824e15eb98fe898f5920ed3a48d5522aeba223ac503dbac1e94890d0d311cecd77f663322ebe84e79779c53ba113c3ac3acae
-
Filesize
363.6MB
MD5b9c17a161956e0b6ef4d99b413901281
SHA14502e2523bd3a01321ac895aa291fb3d7bfc60d4
SHA256efcedf5659cdc21230538d9c9ef49e12494e414817f61532295389b27192e327
SHA5129caaa0a16410881f0fa3e86eaafed9b7b8749a023b3cf3a5ea2429d02726ad9e642c478c5f86048a2294a50e0a28eb4e9e469163f65ca53933ac9f9d4f9c1eb7