Analysis
-
max time kernel
152s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:23
Static task
static1
Behavioral task
behavioral1
Sample
4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe
Resource
win10v2004-20230220-en
General
-
Target
4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe
-
Size
554KB
-
MD5
806b93727802ab6e59d30eb60c0d6915
-
SHA1
ff5bc6534f66fa88c87dc53c9dd386cf2c6dd6cb
-
SHA256
4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd
-
SHA512
660e62294c1edd855c0e291e3f1839ceb5f9d9244583cae44207a0aeafd348bd8f43bad584612b1e2d0a2b02c42db5d9ae85e63176857319f0e81e68c8298679
-
SSDEEP
12288:eMrny90EIVI2PmM7t5XnM3OQm+WLnmGPBXq2iQYWKcaR:NyTIVI2eit5khOPIeaR
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 2 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3776-148-0x000000000B290000-0x000000000B8A8000-memory.dmp redline_stealer behavioral2/memory/3776-157-0x000000000B160000-0x000000000B1C6000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 4700 x0047531.exe 3776 g1362961.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0047531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0047531.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3776 g1362961.exe 3776 g1362961.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3776 g1362961.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3456 wrote to memory of 4700 3456 4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe 84 PID 3456 wrote to memory of 4700 3456 4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe 84 PID 3456 wrote to memory of 4700 3456 4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe 84 PID 4700 wrote to memory of 3776 4700 x0047531.exe 85 PID 4700 wrote to memory of 3776 4700 x0047531.exe 85 PID 4700 wrote to memory of 3776 4700 x0047531.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe"C:\Users\Admin\AppData\Local\Temp\4c704574790a3f618497a05ca7e00d3e0acce9f02b921055e81714cf7aee4fbd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0047531.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0047531.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1362961.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1362961.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5566fd352dab97049f5b38fc2dd4bfc2c
SHA165bf7e2116615ae7185369eb48d1e195a006fce2
SHA256180160a4ef9108cb6d03ba8497f35ac3b0281ec5e5b58198366ce0dd7914faaa
SHA5128dc46785d3b6c7045ac883d65d79fd919f20dc78ab68c9f9e8d6cfea31c7babdb920bb394372d52f9f9413487797e44e2d42d245ebcb99dfdb667bc2061b50af
-
Filesize
382KB
MD5566fd352dab97049f5b38fc2dd4bfc2c
SHA165bf7e2116615ae7185369eb48d1e195a006fce2
SHA256180160a4ef9108cb6d03ba8497f35ac3b0281ec5e5b58198366ce0dd7914faaa
SHA5128dc46785d3b6c7045ac883d65d79fd919f20dc78ab68c9f9e8d6cfea31c7babdb920bb394372d52f9f9413487797e44e2d42d245ebcb99dfdb667bc2061b50af
-
Filesize
169KB
MD5875fe879a6710f2d234c364ed16f91f6
SHA1e046da6a3e0e5b1ee619aa529be24d131bf001cf
SHA256fd6d75036030d9db26a2a97d25aa9799de99254bfece746fcfff515535ec2ac3
SHA512e5b23d50b1c9504c1548c44e60d9c023aba4e13fbd4c1837936d1407cd3016cb0106131f41d447ca8e8ae81ea9ee05b8d28a598556d43659ba07d0cfc1fbb0fe
-
Filesize
169KB
MD5875fe879a6710f2d234c364ed16f91f6
SHA1e046da6a3e0e5b1ee619aa529be24d131bf001cf
SHA256fd6d75036030d9db26a2a97d25aa9799de99254bfece746fcfff515535ec2ac3
SHA512e5b23d50b1c9504c1548c44e60d9c023aba4e13fbd4c1837936d1407cd3016cb0106131f41d447ca8e8ae81ea9ee05b8d28a598556d43659ba07d0cfc1fbb0fe