Analysis

  • max time kernel
    139s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:09

General

  • Target

    5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353.exe

  • Size

    866KB

  • MD5

    e95b8935e10735bbd127f4039a94bf91

  • SHA1

    ea2863c1a307a6dee8aceb186a057c7e5e826ac8

  • SHA256

    5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353

  • SHA512

    9181c070b504ec4b0f78a21b02e5c875bb58b4e76b12904963934168443584b3019748a2f610f09e70dd55f352f9b150fc9caa09c42d7ba4ab1cbba99c828772

  • SSDEEP

    12288:dy90NPSdeIy3rjKH6IsuDH6ZgEN5Z+dcXMA3uaHPTuInvMo/yruVpU:dyULKH6IsQH62E1Rea7io/yus

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353.exe
    "C:\Users\Admin\AppData\Local\Temp\5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:8
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 1388
          4⤵
          • Program crash
          PID:3700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
        3⤵
        • Executes dropped EXE
        PID:4632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 992 -ip 992
    1⤵
      PID:1940

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe

      Filesize

      578KB

      MD5

      af7b28d4af94cd89debea7b3920a0257

      SHA1

      42dea5593656f685e9f7211845b6720d6734b002

      SHA256

      f8479c29a09c5171b635edde25dcbd05331bb4e42010d5723e767d27a00966db

      SHA512

      c7150eefa4fc38e93224b29df427a0f16d59623baf9c5af9e6df1eadd467af21f7769eede7d22576939e449fdd84bad95af83e1da9e1dcd6764f7ef7ccd0fcfe

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe

      Filesize

      578KB

      MD5

      af7b28d4af94cd89debea7b3920a0257

      SHA1

      42dea5593656f685e9f7211845b6720d6734b002

      SHA256

      f8479c29a09c5171b635edde25dcbd05331bb4e42010d5723e767d27a00966db

      SHA512

      c7150eefa4fc38e93224b29df427a0f16d59623baf9c5af9e6df1eadd467af21f7769eede7d22576939e449fdd84bad95af83e1da9e1dcd6764f7ef7ccd0fcfe

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe

      Filesize

      575KB

      MD5

      444ea496d80575b5845675470f8d6128

      SHA1

      494c4741140163e4e929dac52738edb01d5fc448

      SHA256

      e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

      SHA512

      e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe

      Filesize

      575KB

      MD5

      444ea496d80575b5845675470f8d6128

      SHA1

      494c4741140163e4e929dac52738edb01d5fc448

      SHA256

      e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

      SHA512

      e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe

      Filesize

      172KB

      MD5

      8a8bf07bbd4320602a1c80f3d88f9c62

      SHA1

      d7533d703a41da477b1447d18d461bc74c585dbf

      SHA256

      9140baca7cd75f25f146051dc55b6980e6f1541c5a12eaa4bf71138c32599953

      SHA512

      d1b073309ae0be345d7a3486082a32099b8aa47c1b96e02c4b96a34a93c35fb49e14f5ea044cf1939b7c81f114f18d93c94e8ddf063f8423a28c17898381a723

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe

      Filesize

      172KB

      MD5

      8a8bf07bbd4320602a1c80f3d88f9c62

      SHA1

      d7533d703a41da477b1447d18d461bc74c585dbf

      SHA256

      9140baca7cd75f25f146051dc55b6980e6f1541c5a12eaa4bf71138c32599953

      SHA512

      d1b073309ae0be345d7a3486082a32099b8aa47c1b96e02c4b96a34a93c35fb49e14f5ea044cf1939b7c81f114f18d93c94e8ddf063f8423a28c17898381a723

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/8-2320-0x0000000000800000-0x000000000082E000-memory.dmp

      Filesize

      184KB

    • memory/8-2324-0x0000000005830000-0x0000000005E48000-memory.dmp

      Filesize

      6.1MB

    • memory/8-2329-0x0000000005570000-0x00000000055AC000-memory.dmp

      Filesize

      240KB

    • memory/8-2328-0x0000000005100000-0x0000000005110000-memory.dmp

      Filesize

      64KB

    • memory/8-2327-0x0000000005040000-0x0000000005052000-memory.dmp

      Filesize

      72KB

    • memory/8-2325-0x0000000005320000-0x000000000542A000-memory.dmp

      Filesize

      1.0MB

    • memory/992-181-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-198-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-157-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-161-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-163-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-165-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-167-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-169-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-171-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-173-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-175-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-177-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-179-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-156-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-183-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-185-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-187-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-189-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-191-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-193-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-195-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-159-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-200-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-202-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-204-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-206-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-208-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-210-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-212-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-214-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-216-0x0000000005760000-0x00000000057C0000-memory.dmp

      Filesize

      384KB

    • memory/992-2287-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-2305-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-2306-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-2308-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-155-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-154-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-153-0x0000000005150000-0x00000000056F4000-memory.dmp

      Filesize

      5.6MB

    • memory/992-152-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-149-0x0000000000400000-0x0000000000835000-memory.dmp

      Filesize

      4.2MB

    • memory/992-2322-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/992-148-0x0000000000840000-0x000000000089B000-memory.dmp

      Filesize

      364KB

    • memory/4632-2335-0x0000000000030000-0x0000000000060000-memory.dmp

      Filesize

      192KB

    • memory/4632-2336-0x00000000048C0000-0x00000000048D0000-memory.dmp

      Filesize

      64KB