Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:52

General

  • Target

    a871b0346c7dd19861a2ea7ee0ce6b7f757d6b895c7c7b8e3eecfd2e15b02d4b.exe

  • Size

    1.2MB

  • MD5

    06fd164ff0f3790b57cbacea36e20bed

  • SHA1

    9625778238581459b00b977fc305a1bd120351cd

  • SHA256

    a871b0346c7dd19861a2ea7ee0ce6b7f757d6b895c7c7b8e3eecfd2e15b02d4b

  • SHA512

    83c009f42e926193397d4db6772618be2e782e3f4332920bff8efb82ab19caaf12334460960e4d7631054b513b1b8ae5db71d99fc491b12430ac8d78b0004bd9

  • SSDEEP

    24576:jyY+37JTO8mpS3MeABZ3MIJmy49idjikksLVvB6p5+rZAByLT0lf:2Y+LJTg4MekzB1UsLVv0D+rZrLT0l

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a871b0346c7dd19861a2ea7ee0ce6b7f757d6b895c7c7b8e3eecfd2e15b02d4b.exe
    "C:\Users\Admin\AppData\Local\Temp\a871b0346c7dd19861a2ea7ee0ce6b7f757d6b895c7c7b8e3eecfd2e15b02d4b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z42202217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z42202217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z99259305.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z99259305.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26361690.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26361690.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3416
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49799954.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49799954.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:1304
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 1372
              6⤵
              • Program crash
              PID:3844
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t95043863.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t95043863.exe
            5⤵
            • Executes dropped EXE
            PID:3908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 224 -ip 224
    1⤵
      PID:3660

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z42202217.exe
      Filesize

      1.0MB

      MD5

      8ec9b4dce5d7719848e5fa4da3ec08f4

      SHA1

      6e52062e6a8af9844cf6ba1266c78c3d9dab90ba

      SHA256

      77148f2bb9a04c304bf8df9529cd4e0085e0dba261b4c721df77897aa1bc6cb6

      SHA512

      e9e418e4ae962ce6b020c1dadd250b023ffdb322d1aa39f8e76934e9a0af5d22ba9255c2ad092a4b3bd6ee8fc1d4686e419ab7dfbc1e10e1269de4eea611e4ac

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z42202217.exe
      Filesize

      1.0MB

      MD5

      8ec9b4dce5d7719848e5fa4da3ec08f4

      SHA1

      6e52062e6a8af9844cf6ba1266c78c3d9dab90ba

      SHA256

      77148f2bb9a04c304bf8df9529cd4e0085e0dba261b4c721df77897aa1bc6cb6

      SHA512

      e9e418e4ae962ce6b020c1dadd250b023ffdb322d1aa39f8e76934e9a0af5d22ba9255c2ad092a4b3bd6ee8fc1d4686e419ab7dfbc1e10e1269de4eea611e4ac

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z99259305.exe
      Filesize

      764KB

      MD5

      e2462f40c0554caad6e7eb79c76dd486

      SHA1

      3cd8723c30ed54c54088f087889f7a9108ebaa5b

      SHA256

      4676f0d6d1d336891914005551ff27845b9c0efa75910a0e45a57c11910e839c

      SHA512

      6c84246af18e1616b972eceef724c4ee934b58807a25fc681bac2737e5c0df71db040c2f5bf1064a3e769a516d0bee26dc95a03aed543dc84bfc1353152830fb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z99259305.exe
      Filesize

      764KB

      MD5

      e2462f40c0554caad6e7eb79c76dd486

      SHA1

      3cd8723c30ed54c54088f087889f7a9108ebaa5b

      SHA256

      4676f0d6d1d336891914005551ff27845b9c0efa75910a0e45a57c11910e839c

      SHA512

      6c84246af18e1616b972eceef724c4ee934b58807a25fc681bac2737e5c0df71db040c2f5bf1064a3e769a516d0bee26dc95a03aed543dc84bfc1353152830fb

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26361690.exe
      Filesize

      581KB

      MD5

      78b11752ffe4ed0beeec2bb7e7a9c673

      SHA1

      c8eb50261f1d12cc64d8ec8c2fd4f0df3780576c

      SHA256

      246cd2ce4b03e802611b82e71f3c5bf943da75a28eaea5f9212164e565b7f021

      SHA512

      5e7f685cf53fea12a7904c1129f416f781612f81b8878b0ba62df7e67f2a6b8c175e5eca3945dac355611babd1bb669b4372c98a5e285cd5d8f0a851773b8083

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26361690.exe
      Filesize

      581KB

      MD5

      78b11752ffe4ed0beeec2bb7e7a9c673

      SHA1

      c8eb50261f1d12cc64d8ec8c2fd4f0df3780576c

      SHA256

      246cd2ce4b03e802611b82e71f3c5bf943da75a28eaea5f9212164e565b7f021

      SHA512

      5e7f685cf53fea12a7904c1129f416f781612f81b8878b0ba62df7e67f2a6b8c175e5eca3945dac355611babd1bb669b4372c98a5e285cd5d8f0a851773b8083

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49799954.exe
      Filesize

      580KB

      MD5

      88cc7502c3149f5541e942d13172e2cb

      SHA1

      87bcb17f7dbb857abd1eb68bc1f5ab7c70b536ce

      SHA256

      3c2b2ca17881b969ec552387442afb47d01139bb8ced968011e9ba097b2dce7d

      SHA512

      2883e50471ae24bd292980a8e5284c871c1b4cf2880fd03707c37364947a211400307029b1e9b0a7ef7ac899edbc7f2b3fd01b4de2ba8a9cc5f8e71c244114c9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49799954.exe
      Filesize

      580KB

      MD5

      88cc7502c3149f5541e942d13172e2cb

      SHA1

      87bcb17f7dbb857abd1eb68bc1f5ab7c70b536ce

      SHA256

      3c2b2ca17881b969ec552387442afb47d01139bb8ced968011e9ba097b2dce7d

      SHA512

      2883e50471ae24bd292980a8e5284c871c1b4cf2880fd03707c37364947a211400307029b1e9b0a7ef7ac899edbc7f2b3fd01b4de2ba8a9cc5f8e71c244114c9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t95043863.exe
      Filesize

      169KB

      MD5

      841d16cc27463dcd88b7334617b54e3b

      SHA1

      e5fa1a080d1935827e54841239234f70d2b9533f

      SHA256

      9bc1753f71f72a1e3b504e4963b02a311dd74404453166d36d25454117b066a9

      SHA512

      e8c17fe403a996befa5df2db3fffa58ca87d57591554b8e637b6f7194f8a3361c80f3cc4cbfe6513e1fadc963c2df458731f0021f416420a4a99587f77d45133

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t95043863.exe
      Filesize

      169KB

      MD5

      841d16cc27463dcd88b7334617b54e3b

      SHA1

      e5fa1a080d1935827e54841239234f70d2b9533f

      SHA256

      9bc1753f71f72a1e3b504e4963b02a311dd74404453166d36d25454117b066a9

      SHA512

      e8c17fe403a996befa5df2db3fffa58ca87d57591554b8e637b6f7194f8a3361c80f3cc4cbfe6513e1fadc963c2df458731f0021f416420a4a99587f77d45133

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/224-196-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-212-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-165-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-167-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-168-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/224-166-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/224-170-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-172-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-174-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-176-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-180-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-178-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-182-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-184-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-186-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-188-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-190-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-192-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-194-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-163-0x0000000004EF0000-0x0000000005494000-memory.dmp
      Filesize

      5.6MB

    • memory/224-198-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-200-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-202-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-204-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-206-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-208-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-210-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-164-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/224-214-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-216-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-218-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-220-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-222-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-224-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-226-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-228-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-230-0x00000000054E0000-0x0000000005540000-memory.dmp
      Filesize

      384KB

    • memory/224-2047-0x0000000000910000-0x000000000096B000-memory.dmp
      Filesize

      364KB

    • memory/224-2317-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/224-2318-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/224-2319-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/224-2321-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/224-162-0x0000000000910000-0x000000000096B000-memory.dmp
      Filesize

      364KB

    • memory/1304-2332-0x00000000059F0000-0x0000000006008000-memory.dmp
      Filesize

      6.1MB

    • memory/1304-2333-0x00000000054E0000-0x00000000055EA000-memory.dmp
      Filesize

      1.0MB

    • memory/1304-2334-0x0000000005210000-0x0000000005222000-memory.dmp
      Filesize

      72KB

    • memory/1304-2335-0x0000000005270000-0x00000000052AC000-memory.dmp
      Filesize

      240KB

    • memory/1304-2336-0x00000000052C0000-0x00000000052D0000-memory.dmp
      Filesize

      64KB

    • memory/1304-2331-0x00000000009D0000-0x00000000009FE000-memory.dmp
      Filesize

      184KB

    • memory/1304-2343-0x00000000052C0000-0x00000000052D0000-memory.dmp
      Filesize

      64KB

    • memory/3908-2341-0x0000000000E50000-0x0000000000E7E000-memory.dmp
      Filesize

      184KB

    • memory/3908-2342-0x0000000005850000-0x0000000005860000-memory.dmp
      Filesize

      64KB

    • memory/3908-2344-0x0000000005850000-0x0000000005860000-memory.dmp
      Filesize

      64KB