Analysis

  • max time kernel
    162s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:32

General

  • Target

    4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe

  • Size

    794KB

  • MD5

    2e2cb94c52f219949afac7147e5c52ac

  • SHA1

    ca2b5d00dbfacf16e4a5c6a876a59dc60231de1e

  • SHA256

    4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa

  • SHA512

    8e2f9ac1d8f0ce9d80ebf5e765e3f2921225087c1bbea462c33c1bb3c0e8c818bd9a44b6085be4460001a2d7d96abecd039c52bd49ec5c14dd1ddeb533acf465

  • SSDEEP

    24576:9y/3TbGwAOwpfYyg4GiQBOE1JlhgB7P7:YfTbGHnpfNGLOEvlhy

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe
    "C:\Users\Admin\AppData\Local\Temp\4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:4740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 1388
          4⤵
          • Program crash
          PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe
        3⤵
        • Executes dropped EXE
        PID:2276
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1364 -ip 1364
    1⤵
      PID:3604

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe

      Filesize

      589KB

      MD5

      d84a2dd7b407151528a40cb03238998a

      SHA1

      26231ff726042ce1bdb689da59349a3338e39f9f

      SHA256

      d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9

      SHA512

      af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe

      Filesize

      589KB

      MD5

      d84a2dd7b407151528a40cb03238998a

      SHA1

      26231ff726042ce1bdb689da59349a3338e39f9f

      SHA256

      d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9

      SHA512

      af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

      Filesize

      530KB

      MD5

      ff712479854c27f978c935f4801e6a21

      SHA1

      e65b073e8a92a30ccbe898d5abe2b1b594dd44de

      SHA256

      d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

      SHA512

      5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

      Filesize

      530KB

      MD5

      ff712479854c27f978c935f4801e6a21

      SHA1

      e65b073e8a92a30ccbe898d5abe2b1b594dd44de

      SHA256

      d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

      SHA512

      5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe

      Filesize

      169KB

      MD5

      8094da4dd18995647830baab08b70025

      SHA1

      62a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e

      SHA256

      660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8

      SHA512

      f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe

      Filesize

      169KB

      MD5

      8094da4dd18995647830baab08b70025

      SHA1

      62a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e

      SHA256

      660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8

      SHA512

      f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1364-188-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-200-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-153-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-156-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-154-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-158-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-157-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-160-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-162-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-164-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-166-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-168-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-170-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-172-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-174-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-176-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-178-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-180-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-182-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-184-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-186-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-150-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-190-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-192-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-194-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-198-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-196-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-151-0x0000000000D30000-0x0000000000D8B000-memory.dmp

      Filesize

      364KB

    • memory/1364-202-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-204-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-206-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-208-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-210-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-212-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-214-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-216-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/1364-2310-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-2314-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-2315-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-2316-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-2319-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/1364-148-0x0000000005160000-0x0000000005704000-memory.dmp

      Filesize

      5.6MB

    • memory/1364-149-0x0000000005750000-0x00000000057B0000-memory.dmp

      Filesize

      384KB

    • memory/2276-2333-0x0000000000480000-0x00000000004B0000-memory.dmp

      Filesize

      192KB

    • memory/2276-2334-0x00000000027A0000-0x00000000027B0000-memory.dmp

      Filesize

      64KB

    • memory/2276-2335-0x00000000027A0000-0x00000000027B0000-memory.dmp

      Filesize

      64KB

    • memory/4740-2320-0x0000000004E20000-0x0000000004F2A000-memory.dmp

      Filesize

      1.0MB

    • memory/4740-2321-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

      Filesize

      72KB

    • memory/4740-2322-0x0000000004B00000-0x0000000004B10000-memory.dmp

      Filesize

      64KB

    • memory/4740-2324-0x0000000004B00000-0x0000000004B10000-memory.dmp

      Filesize

      64KB

    • memory/4740-2326-0x0000000004D90000-0x0000000004DCC000-memory.dmp

      Filesize

      240KB

    • memory/4740-2317-0x0000000005330000-0x0000000005948000-memory.dmp

      Filesize

      6.1MB

    • memory/4740-2313-0x0000000000230000-0x000000000025E000-memory.dmp

      Filesize

      184KB