Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:14
Static task
static1
Behavioral task
behavioral1
Sample
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe
Resource
win10v2004-20230220-en
General
-
Target
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe
-
Size
794KB
-
MD5
a6e4b2ce9f7cf879d31fe1e2a08e8666
-
SHA1
e7f96de935562bf32d3524a47144989e02a6b718
-
SHA256
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f
-
SHA512
627114d79ca1c769aa3ea1bb9aeb53a302da351ca09700229660690d4179e5795c815307cb83131da12090c6ef73afdbac94c71bc7aea6c343f1be0fad2d4691
-
SSDEEP
24576:/yueo+YGvBJzaPTbi3sCQGsg3vebHVwAmcz:Ko+7BJGPTb4Jag3vG15mc
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3744-2316-0x0000000005510000-0x0000000005B28000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation m15459754.exe -
Executes dropped EXE 4 IoCs
pid Process 4388 x02713678.exe 5068 m15459754.exe 3744 1.exe 1132 n73998508.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x02713678.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x02713678.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3432 5068 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5068 m15459754.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2252 wrote to memory of 4388 2252 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 84 PID 2252 wrote to memory of 4388 2252 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 84 PID 2252 wrote to memory of 4388 2252 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 84 PID 4388 wrote to memory of 5068 4388 x02713678.exe 85 PID 4388 wrote to memory of 5068 4388 x02713678.exe 85 PID 4388 wrote to memory of 5068 4388 x02713678.exe 85 PID 5068 wrote to memory of 3744 5068 m15459754.exe 86 PID 5068 wrote to memory of 3744 5068 m15459754.exe 86 PID 5068 wrote to memory of 3744 5068 m15459754.exe 86 PID 4388 wrote to memory of 1132 4388 x02713678.exe 93 PID 4388 wrote to memory of 1132 4388 x02713678.exe 93 PID 4388 wrote to memory of 1132 4388 x02713678.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe"C:\Users\Admin\AppData\Local\Temp\631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x02713678.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x02713678.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m15459754.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m15459754.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 13724⤵
- Program crash
PID:3432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n73998508.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n73998508.exe3⤵
- Executes dropped EXE
PID:1132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5068 -ip 50681⤵PID:3904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD541dda4005e27a08cb3dd61caf6fcb0ee
SHA13acef2fc98a54f05bdf631a184273be7c23324e4
SHA2567d9b89bd0914d5bf893e0ec10acf678a09b5def77b950ad52bff007ee903f1ee
SHA512cb56d4f4d20483024624168fbe9222f90a957a9056a51f3f98e3a248aac55498e76517779b1fc883c5f7d6727260ffa3841a7394e6b2aa2a5080c10bd9d967e5
-
Filesize
589KB
MD541dda4005e27a08cb3dd61caf6fcb0ee
SHA13acef2fc98a54f05bdf631a184273be7c23324e4
SHA2567d9b89bd0914d5bf893e0ec10acf678a09b5def77b950ad52bff007ee903f1ee
SHA512cb56d4f4d20483024624168fbe9222f90a957a9056a51f3f98e3a248aac55498e76517779b1fc883c5f7d6727260ffa3841a7394e6b2aa2a5080c10bd9d967e5
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
168KB
MD5f3ddb3e7e2d5d2c8335f02182f558258
SHA1dada57acc3eee8dfc4642154d21fc7d3dd0ab593
SHA2566571ee0a7d389f3ae154ce54713ed56fc21795b70e5a788de31445a0e67235de
SHA512a6c5d227b32fb42a67f8b7a0b7238032e01cef956b07fcf0898ce6f04c21b91710ffbd84b6823aeefd265a683564f608d37ebeccf0f20e3bb6e071818e7b737d
-
Filesize
168KB
MD5f3ddb3e7e2d5d2c8335f02182f558258
SHA1dada57acc3eee8dfc4642154d21fc7d3dd0ab593
SHA2566571ee0a7d389f3ae154ce54713ed56fc21795b70e5a788de31445a0e67235de
SHA512a6c5d227b32fb42a67f8b7a0b7238032e01cef956b07fcf0898ce6f04c21b91710ffbd84b6823aeefd265a683564f608d37ebeccf0f20e3bb6e071818e7b737d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf