Analysis
-
max time kernel
135s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe
Resource
win10v2004-20230220-en
General
-
Target
bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe
-
Size
866KB
-
MD5
b599e6e7e3a4908be39d15243858b02e
-
SHA1
fca69ba2b226f6cf6aa835e6cde61e7b4c8c8a65
-
SHA256
bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a
-
SHA512
86738d1d11794ef880ac9c3559af737178e38a2ad2307a395dc0a2fd6688cfca5cb3bf28cbf493077da0ea8fd6b56631db4eda76751bdfcf01fc790907eac718
-
SSDEEP
12288:ky90UroYWOdhbhH9fWIKzS9eRFiDus8Sr//5WzRwfq7L9r1P7sgglTw96W6PyVa4:kyvoYlDbhQ7uKFSL/4zR8E5rZxCFjk
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1892-2316-0x0000000005E90000-0x00000000064A8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation p66366768.exe -
Executes dropped EXE 4 IoCs
pid Process 2280 y63290661.exe 2040 p66366768.exe 1892 1.exe 3084 r02244702.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y63290661.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y63290661.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4848 2040 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2040 p66366768.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2280 1504 bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe 84 PID 1504 wrote to memory of 2280 1504 bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe 84 PID 1504 wrote to memory of 2280 1504 bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe 84 PID 2280 wrote to memory of 2040 2280 y63290661.exe 85 PID 2280 wrote to memory of 2040 2280 y63290661.exe 85 PID 2280 wrote to memory of 2040 2280 y63290661.exe 85 PID 2040 wrote to memory of 1892 2040 p66366768.exe 92 PID 2040 wrote to memory of 1892 2040 p66366768.exe 92 PID 2040 wrote to memory of 1892 2040 p66366768.exe 92 PID 2280 wrote to memory of 3084 2280 y63290661.exe 95 PID 2280 wrote to memory of 3084 2280 y63290661.exe 95 PID 2280 wrote to memory of 3084 2280 y63290661.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe"C:\Users\Admin\AppData\Local\Temp\bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63290661.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63290661.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p66366768.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p66366768.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 13844⤵
- Program crash
PID:4848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r02244702.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r02244702.exe3⤵
- Executes dropped EXE
PID:3084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2040 -ip 20401⤵PID:4472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD5bd8638a4945f38684acbbc2e68fae683
SHA1c3d259872a432910d385ab60d1e0304b43d4c7cb
SHA256511c8e909500171846baf2a663ed309cadfef76c33eabfe3f6ac3fa2863e3914
SHA512196f1eff0c2360a23f044383037948c9312cc6056a50af17e18edfe42ff58bc2e3f2078d3128eabfab144322ed1b0570d1ea45196b1cba176e5b28ce0dcc4b2f
-
Filesize
577KB
MD5bd8638a4945f38684acbbc2e68fae683
SHA1c3d259872a432910d385ab60d1e0304b43d4c7cb
SHA256511c8e909500171846baf2a663ed309cadfef76c33eabfe3f6ac3fa2863e3914
SHA512196f1eff0c2360a23f044383037948c9312cc6056a50af17e18edfe42ff58bc2e3f2078d3128eabfab144322ed1b0570d1ea45196b1cba176e5b28ce0dcc4b2f
-
Filesize
574KB
MD5f5c1f0668fd2eab5c7600e580f00de2c
SHA1e267e9e95b3f0978e84795bc59ce8e4ec98941e9
SHA25602e7c55aa3d15f3f04107e9b009c0a69bac8fca401411eb5011be85ae8fccece
SHA51248ee17416cea296ed45cfb2465ed65d63525e891257e41660e30d17ce193ae8090961fa1c10251ea253e92d3e11ff00c34388451745e7817934d6627f1f14d2b
-
Filesize
574KB
MD5f5c1f0668fd2eab5c7600e580f00de2c
SHA1e267e9e95b3f0978e84795bc59ce8e4ec98941e9
SHA25602e7c55aa3d15f3f04107e9b009c0a69bac8fca401411eb5011be85ae8fccece
SHA51248ee17416cea296ed45cfb2465ed65d63525e891257e41660e30d17ce193ae8090961fa1c10251ea253e92d3e11ff00c34388451745e7817934d6627f1f14d2b
-
Filesize
170KB
MD5c046c8b6bafd97d9dbe15e34ac691cec
SHA1ea2ef162675b33044401bdd23ae734d472d1071e
SHA2568991fc2828492f84e64792717646ad6dcd3e31a04fa4d922d73af091822cb5cd
SHA512fe99fe76e6b77963525d182370969c68cf536f82454300f83e105c479bf717e5eef6d831bda1cc8f66f2ba78dae8972d8e56a6a6be769af61396d8cc218f0c91
-
Filesize
170KB
MD5c046c8b6bafd97d9dbe15e34ac691cec
SHA1ea2ef162675b33044401bdd23ae734d472d1071e
SHA2568991fc2828492f84e64792717646ad6dcd3e31a04fa4d922d73af091822cb5cd
SHA512fe99fe76e6b77963525d182370969c68cf536f82454300f83e105c479bf717e5eef6d831bda1cc8f66f2ba78dae8972d8e56a6a6be769af61396d8cc218f0c91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf