Analysis

  • max time kernel
    148s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:45

General

  • Target

    a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe

  • Size

    1.2MB

  • MD5

    1a98a9538634ace8feca80a0e6b83352

  • SHA1

    fdf7ae75defeadb01322609d2a5fe4fe495fe6d8

  • SHA256

    a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de

  • SHA512

    2a4c64ad02f6261e8adb9025a9363bfe4c99564c1c8b09b54e97353c34b9633aaebe384dad1dc3cea84fd56583d4c356e0fd03440f19913a7ffcaeb9b0f74d6c

  • SSDEEP

    24576:3y0lVX24m3CkxqZiI3r9IIX1gPNivRfiTRhRaBfUkE4fxyIUgmfoTWLQ:CuVmp3COsiuBVXUsuRaB/ESxyIFzTWL

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe
    "C:\Users\Admin\AppData\Local\Temp\a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z97338200.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z97338200.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25609759.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25609759.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4280
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60717256.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60717256.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s50658471.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s50658471.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:512
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3832
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t27269544.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t27269544.exe
            5⤵
            • Executes dropped EXE
            PID:3088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z97338200.exe

    Filesize

    1.0MB

    MD5

    68227123f4cdc25bd55f676f20f6bf71

    SHA1

    0bec4a19fe5fef6c2f0409f17538db71b46588a8

    SHA256

    1ea5bd4486723e5ffbe0818eb5107a8db2b6949e3907aa74748079e8f5f910a0

    SHA512

    a8056dfd9fe011a17a5527e8dbc775d6c6ebf1720002c9e203eddad59551765d7f34526f7daa9caad863720156aef65fe81175c2f4193bc6ab6bade62cf20382

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z97338200.exe

    Filesize

    1.0MB

    MD5

    68227123f4cdc25bd55f676f20f6bf71

    SHA1

    0bec4a19fe5fef6c2f0409f17538db71b46588a8

    SHA256

    1ea5bd4486723e5ffbe0818eb5107a8db2b6949e3907aa74748079e8f5f910a0

    SHA512

    a8056dfd9fe011a17a5527e8dbc775d6c6ebf1720002c9e203eddad59551765d7f34526f7daa9caad863720156aef65fe81175c2f4193bc6ab6bade62cf20382

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25609759.exe

    Filesize

    764KB

    MD5

    71b8967d3fec4774098f5b8375d71daa

    SHA1

    0333dbdc38bfdb46d689dc560de36def36689f6b

    SHA256

    6e86e49aa3b16a2d846883bb047935a81e3ca5661a4567b2e861cbf85a3ff7b2

    SHA512

    d5344df9affd03ff6a73df331e50407daf36bb7f32e4a9e0e0d6446c09ced4dc1e6a099a4f45af78a4dd9763a5783d40ea73bebe19ad8d5d8105351c87396740

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25609759.exe

    Filesize

    764KB

    MD5

    71b8967d3fec4774098f5b8375d71daa

    SHA1

    0333dbdc38bfdb46d689dc560de36def36689f6b

    SHA256

    6e86e49aa3b16a2d846883bb047935a81e3ca5661a4567b2e861cbf85a3ff7b2

    SHA512

    d5344df9affd03ff6a73df331e50407daf36bb7f32e4a9e0e0d6446c09ced4dc1e6a099a4f45af78a4dd9763a5783d40ea73bebe19ad8d5d8105351c87396740

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60717256.exe

    Filesize

    582KB

    MD5

    bbdefe45b2a97a912871bf31381b7e05

    SHA1

    1bf7e6aab40dc504d2c16c91eee7039f290de650

    SHA256

    8d3dc896606e20f1d948c2c340a196cea395257ae7cfe8eb529243a73530d0ab

    SHA512

    ab9e752412cd7366e8c89643ae2b473e6a52ecc767821cb469b1b0d4a39c17d942e86292c021860e2d97c07b92f985e87c3765c65af9da9a059d4b1cfad4b258

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60717256.exe

    Filesize

    582KB

    MD5

    bbdefe45b2a97a912871bf31381b7e05

    SHA1

    1bf7e6aab40dc504d2c16c91eee7039f290de650

    SHA256

    8d3dc896606e20f1d948c2c340a196cea395257ae7cfe8eb529243a73530d0ab

    SHA512

    ab9e752412cd7366e8c89643ae2b473e6a52ecc767821cb469b1b0d4a39c17d942e86292c021860e2d97c07b92f985e87c3765c65af9da9a059d4b1cfad4b258

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s50658471.exe

    Filesize

    582KB

    MD5

    f6acc76055e84aa405cc0fa848a72166

    SHA1

    4f24a101713bbbaa06a34a0f2193d9cbf308f359

    SHA256

    babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d

    SHA512

    fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s50658471.exe

    Filesize

    582KB

    MD5

    f6acc76055e84aa405cc0fa848a72166

    SHA1

    4f24a101713bbbaa06a34a0f2193d9cbf308f359

    SHA256

    babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d

    SHA512

    fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t27269544.exe

    Filesize

    169KB

    MD5

    2c936e938948fe64b03b3aa5671fe798

    SHA1

    d761438df05e370c3f10ec8f0668c21b90dc9f82

    SHA256

    60b1a659fc4bba452ed695ac658cbdef9365af26bc69f46403c52f98d99efcc3

    SHA512

    cd2f57cb18e35fa4ba2f19c926bc6d2f31112dc58456e085fff22dd7bb7467f266262ad42ad742400b202712c0421fa0fd179ee2377f98b0f56432f766a652db

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t27269544.exe

    Filesize

    169KB

    MD5

    2c936e938948fe64b03b3aa5671fe798

    SHA1

    d761438df05e370c3f10ec8f0668c21b90dc9f82

    SHA256

    60b1a659fc4bba452ed695ac658cbdef9365af26bc69f46403c52f98d99efcc3

    SHA512

    cd2f57cb18e35fa4ba2f19c926bc6d2f31112dc58456e085fff22dd7bb7467f266262ad42ad742400b202712c0421fa0fd179ee2377f98b0f56432f766a652db

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/512-200-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-216-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-173-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/512-174-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-170-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-176-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-178-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-180-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-182-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-184-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-186-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-188-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-190-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-192-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-194-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-196-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-198-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-169-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/512-202-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-204-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-206-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-208-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-210-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-212-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-214-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-171-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/512-218-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-220-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-222-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-224-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-226-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-228-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-230-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-167-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-165-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-164-0x0000000004F90000-0x0000000004FF0000-memory.dmp

    Filesize

    384KB

  • memory/512-2324-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/512-162-0x0000000002240000-0x000000000229B000-memory.dmp

    Filesize

    364KB

  • memory/512-163-0x0000000005020000-0x00000000055C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3088-2332-0x00000000005D0000-0x00000000005FE000-memory.dmp

    Filesize

    184KB

  • memory/3088-2334-0x0000000005110000-0x000000000521A000-memory.dmp

    Filesize

    1.0MB

  • memory/3088-2335-0x00000000029C0000-0x00000000029D2000-memory.dmp

    Filesize

    72KB

  • memory/3088-2336-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/3088-2339-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/3832-2328-0x0000000000A70000-0x0000000000A9E000-memory.dmp

    Filesize

    184KB

  • memory/3832-2333-0x0000000005A50000-0x0000000006068000-memory.dmp

    Filesize

    6.1MB

  • memory/3832-2338-0x0000000005420000-0x0000000005430000-memory.dmp

    Filesize

    64KB

  • memory/3832-2337-0x0000000005430000-0x000000000546C000-memory.dmp

    Filesize

    240KB

  • memory/3832-2340-0x0000000005420000-0x0000000005430000-memory.dmp

    Filesize

    64KB