Analysis
-
max time kernel
216s -
max time network
258s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe
Resource
win10v2004-20230221-en
General
-
Target
84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe
-
Size
554KB
-
MD5
6a9db533daf0decf305463d347325fa1
-
SHA1
872196015cf7b1e36833535292c0747bba335ff5
-
SHA256
84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b
-
SHA512
cade4df8adacebe36147b902724c16f54d85195e16f3850715b1be633ad9803dea65273790b263aa63164fff8c33a4199566b018da51df55abd42e20259758f0
-
SSDEEP
12288:mMryy908MeXNpg7hvjvDXEu6pa+9poeMWHPy:Yyo03g7hv/0uq3s5Oy
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4428-148-0x00000000056D0000-0x0000000005CE8000-memory.dmp redline_stealer behavioral2/memory/4428-157-0x0000000005430000-0x0000000005496000-memory.dmp redline_stealer behavioral2/memory/4428-159-0x0000000006380000-0x0000000006542000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 1252 x0760107.exe 4428 g7632714.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0760107.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0760107.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4428 g7632714.exe 4428 g7632714.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4428 g7632714.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1252 1796 84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe 79 PID 1796 wrote to memory of 1252 1796 84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe 79 PID 1796 wrote to memory of 1252 1796 84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe 79 PID 1252 wrote to memory of 4428 1252 x0760107.exe 80 PID 1252 wrote to memory of 4428 1252 x0760107.exe 80 PID 1252 wrote to memory of 4428 1252 x0760107.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe"C:\Users\Admin\AppData\Local\Temp\84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0760107.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0760107.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7632714.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7632714.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD50b492620ec92a63761a1928e909ab8d5
SHA1dab641ea33842d372c42a31ad03ad6c0615a9a14
SHA256d8f18adabd56b79f1d938689e952964a9b91c8446c7fc511adca9376c32a8d6d
SHA51216e59404d54b6ab4eaeb6a4dfcb0950e396fa064032927b85c1a497e07ec614d459696fe4c21ecf0ba23abde4198045ed17cc678195df347f85741f0099188a4
-
Filesize
382KB
MD50b492620ec92a63761a1928e909ab8d5
SHA1dab641ea33842d372c42a31ad03ad6c0615a9a14
SHA256d8f18adabd56b79f1d938689e952964a9b91c8446c7fc511adca9376c32a8d6d
SHA51216e59404d54b6ab4eaeb6a4dfcb0950e396fa064032927b85c1a497e07ec614d459696fe4c21ecf0ba23abde4198045ed17cc678195df347f85741f0099188a4
-
Filesize
169KB
MD598c4d2195a38e13944d9f5202c7f21de
SHA159292c5bc09c4b2e73d5634f35f59337633c649b
SHA2568887fb6c8a5e56cffbefa65e2859c3a72fcf1664fc4a582364af4ff879caba3a
SHA51223bbafd983a062777bdfe745e0cdf2b49769abed145be23d011a06bbc9654c4ce2af5720c42ee1f9829427a7d3d4fdeb37c12d519483490fcb8a33c5c41b49ab
-
Filesize
169KB
MD598c4d2195a38e13944d9f5202c7f21de
SHA159292c5bc09c4b2e73d5634f35f59337633c649b
SHA2568887fb6c8a5e56cffbefa65e2859c3a72fcf1664fc4a582364af4ff879caba3a
SHA51223bbafd983a062777bdfe745e0cdf2b49769abed145be23d011a06bbc9654c4ce2af5720c42ee1f9829427a7d3d4fdeb37c12d519483490fcb8a33c5c41b49ab