Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe
Resource
win10v2004-20230220-en
General
-
Target
ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe
-
Size
786KB
-
MD5
eb2c5d0dc2b0b996af3dbc5e40c87a2e
-
SHA1
f33a01be63fae9d29fb988f11671aa1b9a8033dd
-
SHA256
ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117
-
SHA512
628c66d4600f688ee3d59fe1019af3052725bf2b0b0b217879a63dfa5a34c1139d0611bd8d1a7864519c25266181006f6b7eafd3564926cb4ee622bc1a2e3065
-
SSDEEP
12288:Ky90WCDrXETkEoTDMQMFg0IWZJhyaskAb1sD6Ds7+FDDh3KhlWViZz6H2K9A3aoM:KyoXE4EmDpONI8X6ZDfFLKBAAFCl+yr
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2428-2318-0x000000000B100000-0x000000000B718000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m39180132.exe -
Executes dropped EXE 4 IoCs
pid Process 4684 x63674745.exe 5104 m39180132.exe 2428 1.exe 3688 n24312172.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x63674745.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x63674745.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5104 m39180132.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4684 1664 ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe 82 PID 1664 wrote to memory of 4684 1664 ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe 82 PID 1664 wrote to memory of 4684 1664 ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe 82 PID 4684 wrote to memory of 5104 4684 x63674745.exe 83 PID 4684 wrote to memory of 5104 4684 x63674745.exe 83 PID 4684 wrote to memory of 5104 4684 x63674745.exe 83 PID 5104 wrote to memory of 2428 5104 m39180132.exe 87 PID 5104 wrote to memory of 2428 5104 m39180132.exe 87 PID 5104 wrote to memory of 2428 5104 m39180132.exe 87 PID 4684 wrote to memory of 3688 4684 x63674745.exe 88 PID 4684 wrote to memory of 3688 4684 x63674745.exe 88 PID 4684 wrote to memory of 3688 4684 x63674745.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe"C:\Users\Admin\AppData\Local\Temp\ea2ed9b705fe0ecdceea22e5cc24a091a6639a60eaea43bd3d59758b3efbb117.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x63674745.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x63674745.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m39180132.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m39180132.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n24312172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n24312172.exe3⤵
- Executes dropped EXE
PID:3688
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD5308f71a501c4d0dd97fa7f20bf3909ee
SHA1432b7a5edde88e0abb19821e692a8e3600c3dd7c
SHA256ec0e584a691b0af9d36e79f7c3871f8da4f7c116336afd5af4c92afce95211f7
SHA512d128668702e1ca6fec5017fdcac680f3e1f08543798a3d1d7d879b5b62eb0c574af37794746037893c07e411c8aa20f5dbdcdd31efc59b8f07742ee46a9b0ac4
-
Filesize
581KB
MD5308f71a501c4d0dd97fa7f20bf3909ee
SHA1432b7a5edde88e0abb19821e692a8e3600c3dd7c
SHA256ec0e584a691b0af9d36e79f7c3871f8da4f7c116336afd5af4c92afce95211f7
SHA512d128668702e1ca6fec5017fdcac680f3e1f08543798a3d1d7d879b5b62eb0c574af37794746037893c07e411c8aa20f5dbdcdd31efc59b8f07742ee46a9b0ac4
-
Filesize
582KB
MD5a138930decab7e4f8f70e822934d05bf
SHA16731b3a292425cf0d3634f681a26ca6b410f2388
SHA25638af33f38d9a699ce32d42f9582085161860472fd848eebf3b87e24d20442952
SHA51207b9c85f1f0cd698a74da894df6705c6b888c6462f0936f3e7675b1b4e315b063a7b8f18bf57ce7edc19bae5802ba745b6dd0364f7599ddb44865aa54b315a78
-
Filesize
582KB
MD5a138930decab7e4f8f70e822934d05bf
SHA16731b3a292425cf0d3634f681a26ca6b410f2388
SHA25638af33f38d9a699ce32d42f9582085161860472fd848eebf3b87e24d20442952
SHA51207b9c85f1f0cd698a74da894df6705c6b888c6462f0936f3e7675b1b4e315b063a7b8f18bf57ce7edc19bae5802ba745b6dd0364f7599ddb44865aa54b315a78
-
Filesize
171KB
MD5ee2af39b4007afc1e521f90a069c2b63
SHA12615b36b8e894a1c6824b9950b6ccf28702aae31
SHA256a15ca8c0c6cb4f68a18cacbc622f6ffe042b86b8029d62bec80687f7f4444e21
SHA5129b1f23c001aa797104560997b98135225858b1d55e6dec45b920cd669d1aa67c382bd0b552a198f7e5aa0a4737a1865097d549c654d6d70b9727d0431ecf9fe0
-
Filesize
171KB
MD5ee2af39b4007afc1e521f90a069c2b63
SHA12615b36b8e894a1c6824b9950b6ccf28702aae31
SHA256a15ca8c0c6cb4f68a18cacbc622f6ffe042b86b8029d62bec80687f7f4444e21
SHA5129b1f23c001aa797104560997b98135225858b1d55e6dec45b920cd669d1aa67c382bd0b552a198f7e5aa0a4737a1865097d549c654d6d70b9727d0431ecf9fe0
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf