Analysis

  • max time kernel
    267s
  • max time network
    360s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:38

General

  • Target

    45c2ed896f4323dff0b5959f51e2c4df36f6e3329d95943858375e01cfd97b81.exe

  • Size

    479KB

  • MD5

    fd7d427b3041dc3758fcde4d6c7dba33

  • SHA1

    e966159f3ddeaadc7bf7e46e3c38d0027ff0987c

  • SHA256

    45c2ed896f4323dff0b5959f51e2c4df36f6e3329d95943858375e01cfd97b81

  • SHA512

    4a1063a72ef2affb14d500f5c60e55a469076e87fec5a1c2ba9bc60add4127c4d8f487fbefdadb41dfcd6ca96c58c20ebd728b55ed793a8605030290415dc768

  • SSDEEP

    12288:UMrly907WLPkqHmYfNm1ST9MwOujOeEFDtubyzT:Jy6OPkGfAb2EFpjzT

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45c2ed896f4323dff0b5959f51e2c4df36f6e3329d95943858375e01cfd97b81.exe
    "C:\Users\Admin\AppData\Local\Temp\45c2ed896f4323dff0b5959f51e2c4df36f6e3329d95943858375e01cfd97b81.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7569641.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7569641.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5366696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5366696.exe
        3⤵
        • Executes dropped EXE
        PID:4028

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7569641.exe

          Filesize

          307KB

          MD5

          26174960f90b36a73cbbf5a90d068beb

          SHA1

          e6d5b33c34d75091bcb6a9f87b05ccd6b98f15ae

          SHA256

          23bbb60a110f373dc6cb48022fd4ea852b7a0f63ea76267956f5d7f797289253

          SHA512

          7b8823189e382c28b56aeab3a90d21de55091fc66ce6956a37414e60c2846e65b0d73eeda4143cb007f83b2bdd0bd13acbaba9dd3d2c41c0fc4096777a3b5919

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7569641.exe

          Filesize

          307KB

          MD5

          26174960f90b36a73cbbf5a90d068beb

          SHA1

          e6d5b33c34d75091bcb6a9f87b05ccd6b98f15ae

          SHA256

          23bbb60a110f373dc6cb48022fd4ea852b7a0f63ea76267956f5d7f797289253

          SHA512

          7b8823189e382c28b56aeab3a90d21de55091fc66ce6956a37414e60c2846e65b0d73eeda4143cb007f83b2bdd0bd13acbaba9dd3d2c41c0fc4096777a3b5919

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5366696.exe

          Filesize

          136KB

          MD5

          a9e07edf511b7f0a590242db0beb45ab

          SHA1

          44c8df05c09989a6cd64ad4c1953c0489de4c73f

          SHA256

          20e7df9333d48b9aade5b1d213cc7226f44267a9c9528fda0cc27aea2e32fdbe

          SHA512

          8d314898abdb98364a17da544c28d24d3a0a626a588d7b69da118e592e289f9ad85ef4d92202a77d080b0b1c1617495655fb5a0a9ed6c2015c8812dd2aac8cf0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5366696.exe

          Filesize

          136KB

          MD5

          a9e07edf511b7f0a590242db0beb45ab

          SHA1

          44c8df05c09989a6cd64ad4c1953c0489de4c73f

          SHA256

          20e7df9333d48b9aade5b1d213cc7226f44267a9c9528fda0cc27aea2e32fdbe

          SHA512

          8d314898abdb98364a17da544c28d24d3a0a626a588d7b69da118e592e289f9ad85ef4d92202a77d080b0b1c1617495655fb5a0a9ed6c2015c8812dd2aac8cf0

        • memory/4028-147-0x0000000000E90000-0x0000000000EB8000-memory.dmp

          Filesize

          160KB

        • memory/4028-148-0x0000000008160000-0x0000000008778000-memory.dmp

          Filesize

          6.1MB

        • memory/4028-149-0x0000000005780000-0x0000000005792000-memory.dmp

          Filesize

          72KB

        • memory/4028-150-0x0000000007E50000-0x0000000007F5A000-memory.dmp

          Filesize

          1.0MB

        • memory/4028-151-0x0000000007D80000-0x0000000007DBC000-memory.dmp

          Filesize

          240KB

        • memory/4028-152-0x0000000007DE0000-0x0000000007DF0000-memory.dmp

          Filesize

          64KB

        • memory/4028-153-0x0000000007DE0000-0x0000000007DF0000-memory.dmp

          Filesize

          64KB