Analysis

  • max time kernel
    129s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:56

General

  • Target

    ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe

  • Size

    1.2MB

  • MD5

    ca080eb3d0104b0c37add48a18ad3b96

  • SHA1

    3fcc7d01e5db963ea6726302558f40d073fd34c3

  • SHA256

    ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a

  • SHA512

    3bf15bdc33a92f6d106583fd55ee8684c4c699844346d9801d227aec4ed5ae4921030ce1b0e09d25f0a417d37c302212f102567c477557583566f03c0525c439

  • SSDEEP

    24576:8ydUJAt990AuQ9y4WPBLiwcHaAFI2li3nHh+YqZTy7zTVXN:rdjfSAuQALBL1cHh3li3Hh+VgHT

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe
    "C:\Users\Admin\AppData\Local\Temp\ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z72207527.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z72207527.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46486239.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46486239.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z40571477.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z40571477.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4256
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s51661605.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s51661605.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1600
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3688
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1384
              6⤵
              • Program crash
              PID:4292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21912321.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21912321.exe
            5⤵
            • Executes dropped EXE
            PID:1548
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1600 -ip 1600
    1⤵
      PID:4644

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z72207527.exe

      Filesize

      1.0MB

      MD5

      8734f360f733ab73e1e30c64df84168c

      SHA1

      add5fedf3e2f077fa83a4b955e4f6369b902077d

      SHA256

      cb51381d93ff4a1c98d729820fdb0bfaef5c3b272700e9ff5be906191984addf

      SHA512

      c3a2f5a0a886b6517773d203fd58cb3faab01cfa0ab540f43fa5e0dc7f980e6d146caff0915c06bb1ca244389013c1ed78fadd21c97720f4714803cefd0355ad

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z72207527.exe

      Filesize

      1.0MB

      MD5

      8734f360f733ab73e1e30c64df84168c

      SHA1

      add5fedf3e2f077fa83a4b955e4f6369b902077d

      SHA256

      cb51381d93ff4a1c98d729820fdb0bfaef5c3b272700e9ff5be906191984addf

      SHA512

      c3a2f5a0a886b6517773d203fd58cb3faab01cfa0ab540f43fa5e0dc7f980e6d146caff0915c06bb1ca244389013c1ed78fadd21c97720f4714803cefd0355ad

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46486239.exe

      Filesize

      761KB

      MD5

      8b2971f448a4b8000c4a8cdffa1f8b29

      SHA1

      f3fda34bb48a2979efee6f781eccd2bbb8fd091c

      SHA256

      de11f5dc408cebacee5b7979903d2b9a75782313accd1ffb144ea842f2446ddb

      SHA512

      866a092ec4349071294a360c04b015a8cb21c95ca4c903618b7aa6e52e41a5ea74eff1989ccf9ddca1badb10a0e5d1697f2a33e52cc5164ce46c70c13114d85c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46486239.exe

      Filesize

      761KB

      MD5

      8b2971f448a4b8000c4a8cdffa1f8b29

      SHA1

      f3fda34bb48a2979efee6f781eccd2bbb8fd091c

      SHA256

      de11f5dc408cebacee5b7979903d2b9a75782313accd1ffb144ea842f2446ddb

      SHA512

      866a092ec4349071294a360c04b015a8cb21c95ca4c903618b7aa6e52e41a5ea74eff1989ccf9ddca1badb10a0e5d1697f2a33e52cc5164ce46c70c13114d85c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z40571477.exe

      Filesize

      578KB

      MD5

      394fa46df2a0d58a2b8b368af2834d3c

      SHA1

      cc995077b35a00ad4491ba2ba103aa58c3c9c7c5

      SHA256

      c55d41598de775f216ec6b1e07e44557ec147eb0bc705653096cf4ec00335554

      SHA512

      5447cc366e8d73ec6cf38784964cb84a5fd25793c44f6e447f03be154ed95838ed283d75264c3fb4e54bfe67f1a4adf72cfd00550faddbe8d106f8b2429086dd

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z40571477.exe

      Filesize

      578KB

      MD5

      394fa46df2a0d58a2b8b368af2834d3c

      SHA1

      cc995077b35a00ad4491ba2ba103aa58c3c9c7c5

      SHA256

      c55d41598de775f216ec6b1e07e44557ec147eb0bc705653096cf4ec00335554

      SHA512

      5447cc366e8d73ec6cf38784964cb84a5fd25793c44f6e447f03be154ed95838ed283d75264c3fb4e54bfe67f1a4adf72cfd00550faddbe8d106f8b2429086dd

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s51661605.exe

      Filesize

      575KB

      MD5

      aa8d05a215a5a54577aedfe9dacd9909

      SHA1

      5d021fb45d653e7f33000a6c07882836e60410a3

      SHA256

      15fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54

      SHA512

      2684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s51661605.exe

      Filesize

      575KB

      MD5

      aa8d05a215a5a54577aedfe9dacd9909

      SHA1

      5d021fb45d653e7f33000a6c07882836e60410a3

      SHA256

      15fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54

      SHA512

      2684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21912321.exe

      Filesize

      169KB

      MD5

      e554d541ea3cc75772788cadd5c2ed0f

      SHA1

      e1a4f91a70a4993f4e9ed232a47f7ddc057a703b

      SHA256

      c3452320d95f134f43897d97c90bae1db37da6922c3c674458fa48c05a0eef51

      SHA512

      5907c9045769ea86dafad58abf9c2ecd6f1607012300b0162cce0f2785725283e895f6cccb0546859549873b286087fcb906f5ab320250ff1d779d852f591bc2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21912321.exe

      Filesize

      169KB

      MD5

      e554d541ea3cc75772788cadd5c2ed0f

      SHA1

      e1a4f91a70a4993f4e9ed232a47f7ddc057a703b

      SHA256

      c3452320d95f134f43897d97c90bae1db37da6922c3c674458fa48c05a0eef51

      SHA512

      5907c9045769ea86dafad58abf9c2ecd6f1607012300b0162cce0f2785725283e895f6cccb0546859549873b286087fcb906f5ab320250ff1d779d852f591bc2

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1548-2346-0x00000000055E0000-0x00000000055F0000-memory.dmp

      Filesize

      64KB

    • memory/1548-2344-0x00000000055E0000-0x00000000055F0000-memory.dmp

      Filesize

      64KB

    • memory/1548-2343-0x0000000000D70000-0x0000000000D9E000-memory.dmp

      Filesize

      184KB

    • memory/1600-200-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-216-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-170-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-172-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-174-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-176-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-178-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-180-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-182-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-184-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-186-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-188-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-190-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-192-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-194-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-196-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-167-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-198-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-202-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-204-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-206-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-208-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-210-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-212-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-214-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-168-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-218-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-220-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-222-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-224-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-226-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-228-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-230-0x00000000055F0000-0x0000000005650000-memory.dmp

      Filesize

      384KB

    • memory/1600-2319-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/1600-2318-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/1600-2317-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/1600-2316-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/1600-2332-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/1600-162-0x0000000005040000-0x00000000055E4000-memory.dmp

      Filesize

      5.6MB

    • memory/1600-163-0x0000000000840000-0x000000000089B000-memory.dmp

      Filesize

      364KB

    • memory/1600-164-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/1600-165-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/1600-166-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/3688-2338-0x0000000005960000-0x0000000005970000-memory.dmp

      Filesize

      64KB

    • memory/3688-2337-0x0000000005820000-0x000000000585C000-memory.dmp

      Filesize

      240KB

    • memory/3688-2336-0x00000000057C0000-0x00000000057D2000-memory.dmp

      Filesize

      72KB

    • memory/3688-2335-0x0000000005A80000-0x0000000005B8A000-memory.dmp

      Filesize

      1.0MB

    • memory/3688-2333-0x0000000005F90000-0x00000000065A8000-memory.dmp

      Filesize

      6.1MB

    • memory/3688-2345-0x0000000005960000-0x0000000005970000-memory.dmp

      Filesize

      64KB

    • memory/3688-2330-0x0000000000FD0000-0x0000000000FFE000-memory.dmp

      Filesize

      184KB