Analysis

  • max time kernel
    176s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:41

General

  • Target

    48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe

  • Size

    1.2MB

  • MD5

    6f649e371948c8f13ebd2ed3b7cdae04

  • SHA1

    9eb9b925a948064f9f04483e9a0db7d1282a2d6b

  • SHA256

    48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609

  • SHA512

    2b1581ac09bd31ae1cda266ed41dd945f21f8c8c33865a633f02a97b7806cc10517ef8cfabafdec5d8ed938ca5c78df5a4b5ba68942406a97b9dd6ccb2016ea7

  • SSDEEP

    24576:UyTeP6Ep8pKRxvVw++h4Jpj0IMX4A7Xl5QFOLBNqNLPr6WjkkUWsN:jTZEupKJ+iohXnzQFOLTqNLPr6WgkUWs

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe
    "C:\Users\Admin\AppData\Local\Temp\48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z27893271.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z27893271.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z19811102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z19811102.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z87342169.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z87342169.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s75560189.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s75560189.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3788
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:4568
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t24344877.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t24344877.exe
            5⤵
            • Executes dropped EXE
            PID:376

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z27893271.exe
    Filesize

    1.0MB

    MD5

    88ed0d2949fd76fa9c6a081906cb5146

    SHA1

    d79c2e023faf8f9962bea49d1ceedeec439c04f8

    SHA256

    66bbdd13c1de1e964cde9286302ad9a93ce9d4013189c3b2893558effa462f3a

    SHA512

    8a8bfa8541f1aa21395944ce81b23d3689ddc41f27f7fd47cc5f04c8051d07a919609292cc3e721c263dc26d781331110560bec0d15b8105f2926f0f60a1b898

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z27893271.exe
    Filesize

    1.0MB

    MD5

    88ed0d2949fd76fa9c6a081906cb5146

    SHA1

    d79c2e023faf8f9962bea49d1ceedeec439c04f8

    SHA256

    66bbdd13c1de1e964cde9286302ad9a93ce9d4013189c3b2893558effa462f3a

    SHA512

    8a8bfa8541f1aa21395944ce81b23d3689ddc41f27f7fd47cc5f04c8051d07a919609292cc3e721c263dc26d781331110560bec0d15b8105f2926f0f60a1b898

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z19811102.exe
    Filesize

    764KB

    MD5

    5b8e3a8d764d3629265577366fa9eb28

    SHA1

    9ac7b99c1b73cdfeac98df43a4848b53c81a666e

    SHA256

    861cf4e5ed7f7e8fafcdfe5b63a5213fc4293de898d34b3a8ef3adf50584b40a

    SHA512

    0f867e0523e1b510f0e21848469ca6141ee548c5b4f9fa7aa68f006200f534cebc4898bffd4604c4d73840247824fe93736431936c870302f664cbc8a6951a96

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z19811102.exe
    Filesize

    764KB

    MD5

    5b8e3a8d764d3629265577366fa9eb28

    SHA1

    9ac7b99c1b73cdfeac98df43a4848b53c81a666e

    SHA256

    861cf4e5ed7f7e8fafcdfe5b63a5213fc4293de898d34b3a8ef3adf50584b40a

    SHA512

    0f867e0523e1b510f0e21848469ca6141ee548c5b4f9fa7aa68f006200f534cebc4898bffd4604c4d73840247824fe93736431936c870302f664cbc8a6951a96

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z87342169.exe
    Filesize

    582KB

    MD5

    a86059db89b42bfd21aa7155a943394b

    SHA1

    da9e5235ecc06a55abf8811c4019bd729079312a

    SHA256

    759a20c589917231bbc0b59628649831beafde47ecc6b468a8e7957272c0075c

    SHA512

    49df089859116733b5d09c8c637513b3c4daa88130a65a5833cf55b49c1ab236b831a147c8b03178ae00590b4dc153166923ab9c326f7713bd547e97067e6218

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z87342169.exe
    Filesize

    582KB

    MD5

    a86059db89b42bfd21aa7155a943394b

    SHA1

    da9e5235ecc06a55abf8811c4019bd729079312a

    SHA256

    759a20c589917231bbc0b59628649831beafde47ecc6b468a8e7957272c0075c

    SHA512

    49df089859116733b5d09c8c637513b3c4daa88130a65a5833cf55b49c1ab236b831a147c8b03178ae00590b4dc153166923ab9c326f7713bd547e97067e6218

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s75560189.exe
    Filesize

    582KB

    MD5

    28a6c5bb2965de6c05cec6cee16b9ce2

    SHA1

    a1300062a3a86b96d7658e41d10ed6ea5f8cadea

    SHA256

    6f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9

    SHA512

    5d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s75560189.exe
    Filesize

    582KB

    MD5

    28a6c5bb2965de6c05cec6cee16b9ce2

    SHA1

    a1300062a3a86b96d7658e41d10ed6ea5f8cadea

    SHA256

    6f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9

    SHA512

    5d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t24344877.exe
    Filesize

    169KB

    MD5

    20293161205cf24f1bb60d0a1ed59190

    SHA1

    1e74b398b71d1c7be3a27726488328fcf3ed52da

    SHA256

    9ea222d9cf4a3f3ec3a573e562932f615811c7ba26c9a07cb8f113b91ff08c42

    SHA512

    8cae4db568ec80ae6b90f72f7c99f6e78760066354c5319f4e08b65c817f31a9a8665bf5b0e8b9ab5fc0cfbbdda1967a1d124a3f089e399c8134662265261a58

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t24344877.exe
    Filesize

    169KB

    MD5

    20293161205cf24f1bb60d0a1ed59190

    SHA1

    1e74b398b71d1c7be3a27726488328fcf3ed52da

    SHA256

    9ea222d9cf4a3f3ec3a573e562932f615811c7ba26c9a07cb8f113b91ff08c42

    SHA512

    8cae4db568ec80ae6b90f72f7c99f6e78760066354c5319f4e08b65c817f31a9a8665bf5b0e8b9ab5fc0cfbbdda1967a1d124a3f089e399c8134662265261a58

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/376-2339-0x00000000057E0000-0x00000000057F0000-memory.dmp
    Filesize

    64KB

  • memory/376-2337-0x00000000057E0000-0x00000000057F0000-memory.dmp
    Filesize

    64KB

  • memory/376-2333-0x0000000005A00000-0x0000000005B0A000-memory.dmp
    Filesize

    1.0MB

  • memory/376-2331-0x0000000000E20000-0x0000000000E4E000-memory.dmp
    Filesize

    184KB

  • memory/3788-189-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-210-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-170-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-172-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-174-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-176-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-178-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-180-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-182-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-184-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-186-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-190-0x0000000004FD0000-0x0000000004FE0000-memory.dmp
    Filesize

    64KB

  • memory/3788-187-0x0000000004FD0000-0x0000000004FE0000-memory.dmp
    Filesize

    64KB

  • memory/3788-166-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-192-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-194-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-196-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-198-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-200-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-202-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-204-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-206-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-208-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-168-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-212-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-214-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-216-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-218-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-220-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-222-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-224-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-226-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-228-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-230-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-165-0x0000000005640000-0x00000000056A0000-memory.dmp
    Filesize

    384KB

  • memory/3788-2315-0x0000000004FD0000-0x0000000004FE0000-memory.dmp
    Filesize

    64KB

  • memory/3788-162-0x0000000000910000-0x000000000096B000-memory.dmp
    Filesize

    364KB

  • memory/3788-163-0x0000000004FD0000-0x0000000004FE0000-memory.dmp
    Filesize

    64KB

  • memory/3788-164-0x0000000005050000-0x00000000055F4000-memory.dmp
    Filesize

    5.6MB

  • memory/4568-2334-0x00000000058B0000-0x00000000058C2000-memory.dmp
    Filesize

    72KB

  • memory/4568-2335-0x0000000005910000-0x000000000594C000-memory.dmp
    Filesize

    240KB

  • memory/4568-2336-0x00000000056A0000-0x00000000056B0000-memory.dmp
    Filesize

    64KB

  • memory/4568-2332-0x0000000005ED0000-0x00000000064E8000-memory.dmp
    Filesize

    6.1MB

  • memory/4568-2338-0x00000000056A0000-0x00000000056B0000-memory.dmp
    Filesize

    64KB

  • memory/4568-2327-0x0000000000E20000-0x0000000000E4E000-memory.dmp
    Filesize

    184KB