Analysis
-
max time kernel
152s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe
Resource
win10v2004-20230220-en
General
-
Target
c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe
-
Size
479KB
-
MD5
7ac5e28994018893e1a17ee77b15d5f3
-
SHA1
3e983ed80999fb039494d9e28425880b50a038ae
-
SHA256
c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b
-
SHA512
d2db1f16ef84fd2f6860c37e91aec0d98b04417577bbebb6ebcf39fbf6d57410a85a6558210ac74a1d7c8b3723b5c887f590fbf8e5c0e31ce03e4b39e342a16b
-
SSDEEP
12288:tMr6y90mnMZkxQCSvKcio+P2YawD5Fnsu4ou4Jty4:vydakLJcl+PKcT84fy4
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1220-148-0x000000000A5A0000-0x000000000ABB8000-memory.dmp redline_stealer behavioral2/memory/1220-157-0x000000000A4F0000-0x000000000A556000-memory.dmp redline_stealer behavioral2/memory/1220-159-0x000000000AE20000-0x000000000AFE2000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2812 y8760983.exe 1220 k0687545.exe 1036 l4697562.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8760983.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8760983.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1220 k0687545.exe 1220 k0687545.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1220 k0687545.exe Token: SeDebugPrivilege 1036 l4697562.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2812 2996 c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe 84 PID 2996 wrote to memory of 2812 2996 c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe 84 PID 2996 wrote to memory of 2812 2996 c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe 84 PID 2812 wrote to memory of 1220 2812 y8760983.exe 85 PID 2812 wrote to memory of 1220 2812 y8760983.exe 85 PID 2812 wrote to memory of 1220 2812 y8760983.exe 85 PID 2812 wrote to memory of 1036 2812 y8760983.exe 91 PID 2812 wrote to memory of 1036 2812 y8760983.exe 91 PID 2812 wrote to memory of 1036 2812 y8760983.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe"C:\Users\Admin\AppData\Local\Temp\c05366034e52bf6628aa7e99eaed017e51426b2db381deca9923814aba5da32b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8760983.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8760983.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0687545.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0687545.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4697562.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4697562.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5149bdf542a70e8426dcc1ea33421841a
SHA100a837ff204a66b0dedcb75c9afc1644530d16ea
SHA2565e4531b61f62b85b0abb69817a759ff145aa72dab8857eb1a22efc1fe824c09a
SHA5123423a96b2a6322ef6b3e6de5e071920de4dd17d0def232e10e0b8c0b9e9790dcc7018946bc79f9f93f3e5d02c7b10f6dd5b32e38cfbaaea8f19df221a82b8131
-
Filesize
308KB
MD5149bdf542a70e8426dcc1ea33421841a
SHA100a837ff204a66b0dedcb75c9afc1644530d16ea
SHA2565e4531b61f62b85b0abb69817a759ff145aa72dab8857eb1a22efc1fe824c09a
SHA5123423a96b2a6322ef6b3e6de5e071920de4dd17d0def232e10e0b8c0b9e9790dcc7018946bc79f9f93f3e5d02c7b10f6dd5b32e38cfbaaea8f19df221a82b8131
-
Filesize
168KB
MD52d20868c0c2836be594dca28ff0a1a93
SHA12cd59c4178f05184bc2692da59e29b3a7f3db6bc
SHA2566781ebb2515a1357b28cd8aa6304e29c10b42d08f484d324f33b739412cc786f
SHA5123b29b03adb18a1f6db62ff882e961180f3774f29fb00675db10b423f9f04c99b5de83740280691ab70a1ed47a652344864e165d3f509a6475074b3749b50cc17
-
Filesize
168KB
MD52d20868c0c2836be594dca28ff0a1a93
SHA12cd59c4178f05184bc2692da59e29b3a7f3db6bc
SHA2566781ebb2515a1357b28cd8aa6304e29c10b42d08f484d324f33b739412cc786f
SHA5123b29b03adb18a1f6db62ff882e961180f3774f29fb00675db10b423f9f04c99b5de83740280691ab70a1ed47a652344864e165d3f509a6475074b3749b50cc17
-
Filesize
179KB
MD5db8d2b2ce4f58ccdc21801b4d4d1e88a
SHA1f29cbee98a9f96da579520f0f55843d4ea7e2a86
SHA25620b265162b05b71e108523b4e9d8447c27b7d3ccf61658780a7be301d53a19a0
SHA5127185939a40fc2256c8ca13dbc6bee8996a98f0104e53f8745d4c91283af35e5886683ceffa089282f8e856fce39a7325ee6dc0a865f7176ac8d822106781a9b3
-
Filesize
179KB
MD5db8d2b2ce4f58ccdc21801b4d4d1e88a
SHA1f29cbee98a9f96da579520f0f55843d4ea7e2a86
SHA25620b265162b05b71e108523b4e9d8447c27b7d3ccf61658780a7be301d53a19a0
SHA5127185939a40fc2256c8ca13dbc6bee8996a98f0104e53f8745d4c91283af35e5886683ceffa089282f8e856fce39a7325ee6dc0a865f7176ac8d822106781a9b3