Analysis

  • max time kernel
    216s
  • max time network
    258s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 18:34

General

  • Target

    84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe

  • Size

    554KB

  • MD5

    6a9db533daf0decf305463d347325fa1

  • SHA1

    872196015cf7b1e36833535292c0747bba335ff5

  • SHA256

    84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b

  • SHA512

    cade4df8adacebe36147b902724c16f54d85195e16f3850715b1be633ad9803dea65273790b263aa63164fff8c33a4199566b018da51df55abd42e20259758f0

  • SSDEEP

    12288:mMryy908MeXNpg7hvjvDXEu6pa+9poeMWHPy:Yyo03g7hv/0uq3s5Oy

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe
    "C:\Users\Admin\AppData\Local\Temp\84ea92d9b16dc23b6268a47baf20318a8455f2792ac8efae3046214bfd329c9b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0760107.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0760107.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7632714.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7632714.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4428

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0760107.exe

    Filesize

    382KB

    MD5

    0b492620ec92a63761a1928e909ab8d5

    SHA1

    dab641ea33842d372c42a31ad03ad6c0615a9a14

    SHA256

    d8f18adabd56b79f1d938689e952964a9b91c8446c7fc511adca9376c32a8d6d

    SHA512

    16e59404d54b6ab4eaeb6a4dfcb0950e396fa064032927b85c1a497e07ec614d459696fe4c21ecf0ba23abde4198045ed17cc678195df347f85741f0099188a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0760107.exe

    Filesize

    382KB

    MD5

    0b492620ec92a63761a1928e909ab8d5

    SHA1

    dab641ea33842d372c42a31ad03ad6c0615a9a14

    SHA256

    d8f18adabd56b79f1d938689e952964a9b91c8446c7fc511adca9376c32a8d6d

    SHA512

    16e59404d54b6ab4eaeb6a4dfcb0950e396fa064032927b85c1a497e07ec614d459696fe4c21ecf0ba23abde4198045ed17cc678195df347f85741f0099188a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7632714.exe

    Filesize

    169KB

    MD5

    98c4d2195a38e13944d9f5202c7f21de

    SHA1

    59292c5bc09c4b2e73d5634f35f59337633c649b

    SHA256

    8887fb6c8a5e56cffbefa65e2859c3a72fcf1664fc4a582364af4ff879caba3a

    SHA512

    23bbafd983a062777bdfe745e0cdf2b49769abed145be23d011a06bbc9654c4ce2af5720c42ee1f9829427a7d3d4fdeb37c12d519483490fcb8a33c5c41b49ab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7632714.exe

    Filesize

    169KB

    MD5

    98c4d2195a38e13944d9f5202c7f21de

    SHA1

    59292c5bc09c4b2e73d5634f35f59337633c649b

    SHA256

    8887fb6c8a5e56cffbefa65e2859c3a72fcf1664fc4a582364af4ff879caba3a

    SHA512

    23bbafd983a062777bdfe745e0cdf2b49769abed145be23d011a06bbc9654c4ce2af5720c42ee1f9829427a7d3d4fdeb37c12d519483490fcb8a33c5c41b49ab

  • memory/4428-152-0x00000000050F0000-0x000000000512C000-memory.dmp

    Filesize

    240KB

  • memory/4428-154-0x0000000005310000-0x0000000005386000-memory.dmp

    Filesize

    472KB

  • memory/4428-149-0x00000000051C0000-0x00000000052CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4428-150-0x0000000005060000-0x0000000005072000-memory.dmp

    Filesize

    72KB

  • memory/4428-147-0x00000000005E0000-0x0000000000610000-memory.dmp

    Filesize

    192KB

  • memory/4428-151-0x00000000050A0000-0x00000000050B0000-memory.dmp

    Filesize

    64KB

  • memory/4428-153-0x00000000050A0000-0x00000000050B0000-memory.dmp

    Filesize

    64KB

  • memory/4428-148-0x00000000056D0000-0x0000000005CE8000-memory.dmp

    Filesize

    6.1MB

  • memory/4428-155-0x0000000005390000-0x0000000005422000-memory.dmp

    Filesize

    584KB

  • memory/4428-156-0x0000000006790000-0x0000000006D34000-memory.dmp

    Filesize

    5.6MB

  • memory/4428-157-0x0000000005430000-0x0000000005496000-memory.dmp

    Filesize

    408KB

  • memory/4428-158-0x0000000006230000-0x0000000006280000-memory.dmp

    Filesize

    320KB

  • memory/4428-159-0x0000000006380000-0x0000000006542000-memory.dmp

    Filesize

    1.8MB

  • memory/4428-160-0x0000000008960000-0x0000000008E8C000-memory.dmp

    Filesize

    5.2MB