Analysis
-
max time kernel
197s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:11
Static task
static1
Behavioral task
behavioral1
Sample
177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe
Resource
win10v2004-20230220-en
General
-
Target
177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe
-
Size
567KB
-
MD5
9997fd3175f50c1e35624662175bdbd6
-
SHA1
34ba74cf508783b78f63dd70c791b8aad0dca1bb
-
SHA256
177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793
-
SHA512
477b5b154f7e0ad8babadd13755af0aaed4ce23180cfa0fd03c752e7272e88f16bba233f80b8987c325d31fbcf74ded1a81dee0088970fbf6ac8bdf10753b81c
-
SSDEEP
12288:5MrZy90GIn3fD4C9ePFiV0BgJm6iWGcZPi4RS4hT8UBlu:Yyk3fDDec0BgE6iWXZqMSsTnS
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4444-148-0x0000000005A50000-0x0000000006068000-memory.dmp redline_stealer behavioral2/memory/4444-156-0x0000000002960000-0x00000000029C6000-memory.dmp redline_stealer behavioral2/memory/4444-159-0x0000000006730000-0x00000000068F2000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 2820 y4627860.exe 4444 k7380175.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4627860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4627860.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4444 k7380175.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4444 k7380175.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2820 1756 177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe 83 PID 1756 wrote to memory of 2820 1756 177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe 83 PID 1756 wrote to memory of 2820 1756 177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe 83 PID 2820 wrote to memory of 4444 2820 y4627860.exe 84 PID 2820 wrote to memory of 4444 2820 y4627860.exe 84 PID 2820 wrote to memory of 4444 2820 y4627860.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe"C:\Users\Admin\AppData\Local\Temp\177397ad62413fc008bd3836d10109abed11c001b42bb4be9d359be2ebb05793.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4627860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4627860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7380175.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7380175.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD56f9028d26c741abbf8025a7adf0d80ae
SHA1c8886b8da83ecf31be49b7cd164912e9031ea158
SHA2561368316846cca9f75a41f98b82ca73c7777f3aa13337308d54893fd18bb8ffc8
SHA51216dcf7f1365e911ae7d523cf5a416f3b4275b67b7b31d34dbbac03876a8614c89826df4e940e9e2c88fb4171f914de8930bde2fac344020af96a2c8addfc65cc
-
Filesize
308KB
MD56f9028d26c741abbf8025a7adf0d80ae
SHA1c8886b8da83ecf31be49b7cd164912e9031ea158
SHA2561368316846cca9f75a41f98b82ca73c7777f3aa13337308d54893fd18bb8ffc8
SHA51216dcf7f1365e911ae7d523cf5a416f3b4275b67b7b31d34dbbac03876a8614c89826df4e940e9e2c88fb4171f914de8930bde2fac344020af96a2c8addfc65cc
-
Filesize
168KB
MD5dcbce19930d7abe573cd3c797ed0bfba
SHA1dbded78b656816c7b2c1ba7e185b3952f7c6eb6d
SHA2561f45227a3178875c6740a85595b72fb981863aa70e103ea6284a9d4a4fead2d4
SHA512761756723189f0fa97d35470f99d80f4c48f1ba066a2b64fa8a9b6b6aa582998537fd4efabb8920f807f729367f1f6b8dd8da5bfcfe441ceccddff0ceed39fd6
-
Filesize
168KB
MD5dcbce19930d7abe573cd3c797ed0bfba
SHA1dbded78b656816c7b2c1ba7e185b3952f7c6eb6d
SHA2561f45227a3178875c6740a85595b72fb981863aa70e103ea6284a9d4a4fead2d4
SHA512761756723189f0fa97d35470f99d80f4c48f1ba066a2b64fa8a9b6b6aa582998537fd4efabb8920f807f729367f1f6b8dd8da5bfcfe441ceccddff0ceed39fd6