Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 22:20

General

  • Target

    68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e.exe

  • Size

    1.2MB

  • MD5

    36590603cc5bae6ba1f75c3eade33f62

  • SHA1

    8dd445d708c79310b9f3b4a3e9b1f49e01c74eec

  • SHA256

    68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e

  • SHA512

    e7d0ed0373419d4d8bc6c36f4fb1684922c8d65cc28b3318b7199430f3a82fa211c72e61e76dfee0f29a9b6f1c2a732684356379a1abbe5fd1bd031ac4e3e875

  • SSDEEP

    24576:yyjeeuJQb9DeX6uoI3TIHX4b8JBf/jJkHnP9Hd5AdANR9J8u:ZjeeEQpDS6uoIjOXdnf/eHnPdME9

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e.exe
    "C:\Users\Admin\AppData\Local\Temp\68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3320
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1316
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:4132
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe
            5⤵
            • Executes dropped EXE
            PID:3584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe

    Filesize

    1.0MB

    MD5

    70c4faa5a4823d56055873e8f75afe7f

    SHA1

    cf079e314ff8454bb125db0f665ac272113be729

    SHA256

    b2b27653cef7c514929d774eba716da63e0d56340c100d84b52297e35a99fb67

    SHA512

    a33709a978a8191f1ac0611e453f7e50b1a383b9c34d9a8485990bde8e5d100d32a33293a133c16a1964acc0fa4604cc4673d2a2ccd7fd694afeb371033f32ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe

    Filesize

    1.0MB

    MD5

    70c4faa5a4823d56055873e8f75afe7f

    SHA1

    cf079e314ff8454bb125db0f665ac272113be729

    SHA256

    b2b27653cef7c514929d774eba716da63e0d56340c100d84b52297e35a99fb67

    SHA512

    a33709a978a8191f1ac0611e453f7e50b1a383b9c34d9a8485990bde8e5d100d32a33293a133c16a1964acc0fa4604cc4673d2a2ccd7fd694afeb371033f32ab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe

    Filesize

    764KB

    MD5

    3eebbe237414a30dbba1ecc991c8583e

    SHA1

    ca9a61a17cdd754f9851f9d406fa29892b4b58b0

    SHA256

    950f743af1a019f985b64803f6c89f8acfac50b1a2751e0f331a4e7b229be891

    SHA512

    8c0f416dcfd659f0bb2b1b6328c774468b7d1835d233c93a17c68d879e2acbf698314ea1929941d94f37c016914e6f17049d82d44964993a74b5399632c20351

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe

    Filesize

    764KB

    MD5

    3eebbe237414a30dbba1ecc991c8583e

    SHA1

    ca9a61a17cdd754f9851f9d406fa29892b4b58b0

    SHA256

    950f743af1a019f985b64803f6c89f8acfac50b1a2751e0f331a4e7b229be891

    SHA512

    8c0f416dcfd659f0bb2b1b6328c774468b7d1835d233c93a17c68d879e2acbf698314ea1929941d94f37c016914e6f17049d82d44964993a74b5399632c20351

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe

    Filesize

    581KB

    MD5

    f61ba403a82773affa5524bc3476fcd7

    SHA1

    1e20de2a1f0bc636e3e1a9b548efeef5b627f412

    SHA256

    086ef68db2e1330fdf68903cb80e1ae4c0207598cd7d1170a6a05eee7bd99645

    SHA512

    1f40cadcf1a22a350b3aee61423d2182741cdc644e7989e69cf03f45b1bede6b9e32b35d4ce83aa0ae7e84471f9376186f73f27e76501961c8eedbb671454f90

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe

    Filesize

    581KB

    MD5

    f61ba403a82773affa5524bc3476fcd7

    SHA1

    1e20de2a1f0bc636e3e1a9b548efeef5b627f412

    SHA256

    086ef68db2e1330fdf68903cb80e1ae4c0207598cd7d1170a6a05eee7bd99645

    SHA512

    1f40cadcf1a22a350b3aee61423d2182741cdc644e7989e69cf03f45b1bede6b9e32b35d4ce83aa0ae7e84471f9376186f73f27e76501961c8eedbb671454f90

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe

    Filesize

    582KB

    MD5

    ade13a12be52f244a2351da782e2d6db

    SHA1

    c7d9a4b3ab06e6fa542e05113ccd0c4e3f330dd7

    SHA256

    2986455438e269e55a6438aab80859c9437a8f8d02d542c85a6fe91a5d05c37f

    SHA512

    eaf9bc08a0ec4fb8b95c173f5b36d5d8946a3c3b22a0a37556cf9f6bba139ef0ab9f9447f42dfc6430703ffe0a7c7549f3a72dea08aee64c5ab0bf4f19eb902c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe

    Filesize

    582KB

    MD5

    ade13a12be52f244a2351da782e2d6db

    SHA1

    c7d9a4b3ab06e6fa542e05113ccd0c4e3f330dd7

    SHA256

    2986455438e269e55a6438aab80859c9437a8f8d02d542c85a6fe91a5d05c37f

    SHA512

    eaf9bc08a0ec4fb8b95c173f5b36d5d8946a3c3b22a0a37556cf9f6bba139ef0ab9f9447f42dfc6430703ffe0a7c7549f3a72dea08aee64c5ab0bf4f19eb902c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe

    Filesize

    169KB

    MD5

    356867c2250240a4d0a0743bb203fc5b

    SHA1

    7b3f092a7bed48a81143668f093219a0da65aa61

    SHA256

    8f469fc2d1b52e97fd2632598d3373908c325e07a07de60267657e313713459d

    SHA512

    0b11e008d9cd4450e144a15db09e2edc80757efc530306cc48c1e94da747025852ded4bc042cfa59dd889ee9ed7355700ecf98a67a8331fbdbf56ce2efd0ff39

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe

    Filesize

    169KB

    MD5

    356867c2250240a4d0a0743bb203fc5b

    SHA1

    7b3f092a7bed48a81143668f093219a0da65aa61

    SHA256

    8f469fc2d1b52e97fd2632598d3373908c325e07a07de60267657e313713459d

    SHA512

    0b11e008d9cd4450e144a15db09e2edc80757efc530306cc48c1e94da747025852ded4bc042cfa59dd889ee9ed7355700ecf98a67a8331fbdbf56ce2efd0ff39

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1316-196-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-208-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-165-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1316-166-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1316-167-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-168-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-170-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-172-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-174-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-176-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-178-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-180-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-182-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-184-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-186-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-188-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-190-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-192-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-194-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-163-0x0000000004FA0000-0x0000000005544000-memory.dmp

    Filesize

    5.6MB

  • memory/1316-198-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-200-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-202-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-204-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-206-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-164-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1316-210-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-212-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-214-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-216-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-218-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-220-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-222-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-224-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-226-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-228-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-230-0x0000000004F20000-0x0000000004F80000-memory.dmp

    Filesize

    384KB

  • memory/1316-2314-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1316-2323-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1316-2324-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1316-2325-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1316-162-0x0000000002290000-0x00000000022EB000-memory.dmp

    Filesize

    364KB

  • memory/3584-2335-0x0000000000E80000-0x0000000000EAE000-memory.dmp

    Filesize

    184KB

  • memory/3584-2337-0x0000000005910000-0x0000000005A1A000-memory.dmp

    Filesize

    1.0MB

  • memory/3584-2338-0x00000000057C0000-0x00000000057D2000-memory.dmp

    Filesize

    72KB

  • memory/3584-2340-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/3584-2342-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/4132-2330-0x0000000000070000-0x000000000009E000-memory.dmp

    Filesize

    184KB

  • memory/4132-2336-0x000000000A420000-0x000000000AA38000-memory.dmp

    Filesize

    6.1MB

  • memory/4132-2339-0x0000000009E40000-0x0000000009E7C000-memory.dmp

    Filesize

    240KB

  • memory/4132-2341-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB

  • memory/4132-2343-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB