Analysis
-
max time kernel
162s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:32
Static task
static1
Behavioral task
behavioral1
Sample
4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe
Resource
win10v2004-20230220-en
General
-
Target
4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe
-
Size
794KB
-
MD5
2e2cb94c52f219949afac7147e5c52ac
-
SHA1
ca2b5d00dbfacf16e4a5c6a876a59dc60231de1e
-
SHA256
4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa
-
SHA512
8e2f9ac1d8f0ce9d80ebf5e765e3f2921225087c1bbea462c33c1bb3c0e8c818bd9a44b6085be4460001a2d7d96abecd039c52bd49ec5c14dd1ddeb533acf465
-
SSDEEP
24576:9y/3TbGwAOwpfYyg4GiQBOE1JlhgB7P7:YfTbGHnpfNGLOEvlhy
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
danko
185.161.248.73:4164
-
auth_value
784d42a6c1eb1a5060b8bcd3696f5f1e
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4740-2317-0x0000000005330000-0x0000000005948000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m26157799.exe -
Executes dropped EXE 4 IoCs
pid Process 1028 x88796536.exe 1364 m26157799.exe 4740 1.exe 2276 n45276993.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x88796536.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x88796536.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2572 1364 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 m26157799.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1028 1656 4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe 82 PID 1656 wrote to memory of 1028 1656 4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe 82 PID 1656 wrote to memory of 1028 1656 4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe 82 PID 1028 wrote to memory of 1364 1028 x88796536.exe 83 PID 1028 wrote to memory of 1364 1028 x88796536.exe 83 PID 1028 wrote to memory of 1364 1028 x88796536.exe 83 PID 1364 wrote to memory of 4740 1364 m26157799.exe 84 PID 1364 wrote to memory of 4740 1364 m26157799.exe 84 PID 1364 wrote to memory of 4740 1364 m26157799.exe 84 PID 1028 wrote to memory of 2276 1028 x88796536.exe 87 PID 1028 wrote to memory of 2276 1028 x88796536.exe 87 PID 1028 wrote to memory of 2276 1028 x88796536.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe"C:\Users\Admin\AppData\Local\Temp\4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 13884⤵
- Program crash
PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe3⤵
- Executes dropped EXE
PID:2276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1364 -ip 13641⤵PID:3604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD5d84a2dd7b407151528a40cb03238998a
SHA126231ff726042ce1bdb689da59349a3338e39f9f
SHA256d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9
SHA512af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce
-
Filesize
589KB
MD5d84a2dd7b407151528a40cb03238998a
SHA126231ff726042ce1bdb689da59349a3338e39f9f
SHA256d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9
SHA512af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce
-
Filesize
530KB
MD5ff712479854c27f978c935f4801e6a21
SHA1e65b073e8a92a30ccbe898d5abe2b1b594dd44de
SHA256d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf
SHA5125b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768
-
Filesize
530KB
MD5ff712479854c27f978c935f4801e6a21
SHA1e65b073e8a92a30ccbe898d5abe2b1b594dd44de
SHA256d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf
SHA5125b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768
-
Filesize
169KB
MD58094da4dd18995647830baab08b70025
SHA162a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e
SHA256660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8
SHA512f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c
-
Filesize
169KB
MD58094da4dd18995647830baab08b70025
SHA162a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e
SHA256660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8
SHA512f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf