Analysis
-
max time kernel
132s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:20
Static task
static1
Behavioral task
behavioral1
Sample
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe
Resource
win10v2004-20230220-en
General
-
Target
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe
-
Size
774KB
-
MD5
6db523ecaccbecc16f24cc6252e339c1
-
SHA1
fb0843ded0f9021272deaa029a33322c7816870f
-
SHA256
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9
-
SHA512
1ed8ba8df4a91f4f49fda2dc92248490d44ac47469d3823fe48900f436806fe17e85ff1b2387f3eaa635d293eab22407541f58fa0c14fe39121066b506460c64
-
SSDEEP
12288:5y90ZDybGXaGAaNwj9QXU92ImPUSvAYd/LVaP4b7Kvdbj6QcqY4yg0RGAMH:5yoLabQX82ItSoYvIJj6QhYcAMH
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
donka
185.161.248.73:4164
-
auth_value
ebd13e189a2e7c34425e5f4c46bb7a55
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1928-2322-0x0000000005B10000-0x0000000006128000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation m83891755.exe -
Executes dropped EXE 4 IoCs
pid Process 2076 x89439160.exe 2192 m83891755.exe 2336 1.exe 1928 n74153778.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x89439160.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x89439160.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 m83891755.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3980 wrote to memory of 2076 3980 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 81 PID 3980 wrote to memory of 2076 3980 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 81 PID 3980 wrote to memory of 2076 3980 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 81 PID 2076 wrote to memory of 2192 2076 x89439160.exe 82 PID 2076 wrote to memory of 2192 2076 x89439160.exe 82 PID 2076 wrote to memory of 2192 2076 x89439160.exe 82 PID 2192 wrote to memory of 2336 2192 m83891755.exe 83 PID 2192 wrote to memory of 2336 2192 m83891755.exe 83 PID 2192 wrote to memory of 2336 2192 m83891755.exe 83 PID 2076 wrote to memory of 1928 2076 x89439160.exe 84 PID 2076 wrote to memory of 1928 2076 x89439160.exe 84 PID 2076 wrote to memory of 1928 2076 x89439160.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe"C:\Users\Admin\AppData\Local\Temp\43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x89439160.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x89439160.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m83891755.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m83891755.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n74153778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n74153778.exe3⤵
- Executes dropped EXE
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD502b98db89472cd2515f0de4df88b89a3
SHA18c33f4ff038ebc54ab1eacb0eadbd3fd6e3a5f71
SHA2564c9b3e8cc3a92fc8b65f1422b8f2a23e93c60114eeaccde82857b6a21d84ea69
SHA512d81b0081f0634a6f084e6e063186f5592393b9fe9608c9c2b71f50da26e0dbc47423ddf636e4da4781e75ca147d6a778ce67050300f1b1cf3e93324c50466508
-
Filesize
570KB
MD502b98db89472cd2515f0de4df88b89a3
SHA18c33f4ff038ebc54ab1eacb0eadbd3fd6e3a5f71
SHA2564c9b3e8cc3a92fc8b65f1422b8f2a23e93c60114eeaccde82857b6a21d84ea69
SHA512d81b0081f0634a6f084e6e063186f5592393b9fe9608c9c2b71f50da26e0dbc47423ddf636e4da4781e75ca147d6a778ce67050300f1b1cf3e93324c50466508
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
168KB
MD510aaccf3277f9d9c24a78662fc803a56
SHA1a9a4365355437bf12c61a088154165f83043e2de
SHA2566aaedebdae15ff74eeaeafd5f6ecefe1c613f0d8b1e7a02c608b85aa7db33606
SHA512c35207b5c33e8e74bbf446515ae1b927cc68e1e4abdbf22624204b613274924df024605a8fd66d7c2e8a4d4f81814ead558e37d5d61c31de0f8ae110ade3f1c8
-
Filesize
168KB
MD510aaccf3277f9d9c24a78662fc803a56
SHA1a9a4365355437bf12c61a088154165f83043e2de
SHA2566aaedebdae15ff74eeaeafd5f6ecefe1c613f0d8b1e7a02c608b85aa7db33606
SHA512c35207b5c33e8e74bbf446515ae1b927cc68e1e4abdbf22624204b613274924df024605a8fd66d7c2e8a4d4f81814ead558e37d5d61c31de0f8ae110ade3f1c8
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf