Analysis

  • max time kernel
    152s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:23

General

  • Target

    c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe

  • Size

    479KB

  • MD5

    7ac5e28994018893e1a17ee77b15d5f3

  • SHA1

    3e983ed80999fb039494d9e28425880b50a038ae

  • SHA256

    c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b

  • SHA512

    d2db1f16ef84fd2f6860c37e91aec0d98b04417577bbebb6ebcf39fbf6d57410a85a6558210ac74a1d7c8b3723b5c887f590fbf8e5c0e31ce03e4b39e342a16b

  • SSDEEP

    12288:tMr6y90mnMZkxQCSvKcio+P2YawD5Fnsu4ou4Jty4:vydakLJcl+PKcT84fy4

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe
    "C:\Users\Admin\AppData\Local\Temp\c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8760983.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8760983.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0687545.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0687545.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4697562.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4697562.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1036

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8760983.exe

          Filesize

          308KB

          MD5

          149bdf542a70e8426dcc1ea33421841a

          SHA1

          00a837ff204a66b0dedcb75c9afc1644530d16ea

          SHA256

          5e4531b61f62b85b0abb69817a759ff145aa72dab8857eb1a22efc1fe824c09a

          SHA512

          3423a96b2a6322ef6b3e6de5e071920de4dd17d0def232e10e0b8c0b9e9790dcc7018946bc79f9f93f3e5d02c7b10f6dd5b32e38cfbaaea8f19df221a82b8131

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8760983.exe

          Filesize

          308KB

          MD5

          149bdf542a70e8426dcc1ea33421841a

          SHA1

          00a837ff204a66b0dedcb75c9afc1644530d16ea

          SHA256

          5e4531b61f62b85b0abb69817a759ff145aa72dab8857eb1a22efc1fe824c09a

          SHA512

          3423a96b2a6322ef6b3e6de5e071920de4dd17d0def232e10e0b8c0b9e9790dcc7018946bc79f9f93f3e5d02c7b10f6dd5b32e38cfbaaea8f19df221a82b8131

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0687545.exe

          Filesize

          168KB

          MD5

          2d20868c0c2836be594dca28ff0a1a93

          SHA1

          2cd59c4178f05184bc2692da59e29b3a7f3db6bc

          SHA256

          6781ebb2515a1357b28cd8aa6304e29c10b42d08f484d324f33b739412cc786f

          SHA512

          3b29b03adb18a1f6db62ff882e961180f3774f29fb00675db10b423f9f04c99b5de83740280691ab70a1ed47a652344864e165d3f509a6475074b3749b50cc17

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0687545.exe

          Filesize

          168KB

          MD5

          2d20868c0c2836be594dca28ff0a1a93

          SHA1

          2cd59c4178f05184bc2692da59e29b3a7f3db6bc

          SHA256

          6781ebb2515a1357b28cd8aa6304e29c10b42d08f484d324f33b739412cc786f

          SHA512

          3b29b03adb18a1f6db62ff882e961180f3774f29fb00675db10b423f9f04c99b5de83740280691ab70a1ed47a652344864e165d3f509a6475074b3749b50cc17

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4697562.exe

          Filesize

          179KB

          MD5

          db8d2b2ce4f58ccdc21801b4d4d1e88a

          SHA1

          f29cbee98a9f96da579520f0f55843d4ea7e2a86

          SHA256

          20b265162b05b71e108523b4e9d8447c27b7d3ccf61658780a7be301d53a19a0

          SHA512

          7185939a40fc2256c8ca13dbc6bee8996a98f0104e53f8745d4c91283af35e5886683ceffa089282f8e856fce39a7325ee6dc0a865f7176ac8d822106781a9b3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4697562.exe

          Filesize

          179KB

          MD5

          db8d2b2ce4f58ccdc21801b4d4d1e88a

          SHA1

          f29cbee98a9f96da579520f0f55843d4ea7e2a86

          SHA256

          20b265162b05b71e108523b4e9d8447c27b7d3ccf61658780a7be301d53a19a0

          SHA512

          7185939a40fc2256c8ca13dbc6bee8996a98f0104e53f8745d4c91283af35e5886683ceffa089282f8e856fce39a7325ee6dc0a865f7176ac8d822106781a9b3

        • memory/1036-176-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-178-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-194-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-192-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-190-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-188-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-186-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-184-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-182-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-180-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-174-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-173-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/1036-171-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-169-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-165-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/1036-166-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1036-167-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/1220-158-0x000000000AD10000-0x000000000AD60000-memory.dmp

          Filesize

          320KB

        • memory/1220-152-0x00000000048F0000-0x0000000004900000-memory.dmp

          Filesize

          64KB

        • memory/1220-160-0x000000000BC50000-0x000000000C17C000-memory.dmp

          Filesize

          5.2MB

        • memory/1220-159-0x000000000AE20000-0x000000000AFE2000-memory.dmp

          Filesize

          1.8MB

        • memory/1220-147-0x0000000000040000-0x000000000006E000-memory.dmp

          Filesize

          184KB

        • memory/1220-150-0x000000000A030000-0x000000000A042000-memory.dmp

          Filesize

          72KB

        • memory/1220-156-0x000000000B170000-0x000000000B714000-memory.dmp

          Filesize

          5.6MB

        • memory/1220-148-0x000000000A5A0000-0x000000000ABB8000-memory.dmp

          Filesize

          6.1MB

        • memory/1220-149-0x000000000A100000-0x000000000A20A000-memory.dmp

          Filesize

          1.0MB

        • memory/1220-155-0x000000000A350000-0x000000000A3E2000-memory.dmp

          Filesize

          584KB

        • memory/1220-154-0x000000000A2D0000-0x000000000A346000-memory.dmp

          Filesize

          472KB

        • memory/1220-153-0x00000000048F0000-0x0000000004900000-memory.dmp

          Filesize

          64KB

        • memory/1220-157-0x000000000A4F0000-0x000000000A556000-memory.dmp

          Filesize

          408KB

        • memory/1220-151-0x000000000A090000-0x000000000A0CC000-memory.dmp

          Filesize

          240KB