Analysis

  • max time kernel
    135s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:42

General

  • Target

    486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe

  • Size

    1.2MB

  • MD5

    c71ad9455a40262ca2c86afaead5bb08

  • SHA1

    96ce52a4e69a71621b53db6214a7c7f7b9cad5ee

  • SHA256

    486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429

  • SHA512

    d8af58f68252dd01233bdbfabe8d1a799e585e59e45ae9f25bbf7ff1670238be714bf736e80b3da557b8dffd8cfb5cfeda04c54daa266380e7665061e171f7cc

  • SSDEEP

    24576:qye9rGoxD+8YdIjsXtAyXstcz9uDtpdY3ghHg5A6q4IUtFjjAG:xIY8YdIknecz9uxT7A5tqdUTA

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe
    "C:\Users\Admin\AppData\Local\Temp\486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3040
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3872
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 1368
              6⤵
              • Program crash
              PID:3956
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exe
            5⤵
            • Executes dropped EXE
            PID:3992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3040 -ip 3040
    1⤵
      PID:3936

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exe
      Filesize

      1.0MB

      MD5

      6bfb7ee3c2a436e31e52a538d6497a06

      SHA1

      c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d

      SHA256

      077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06

      SHA512

      6934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exe
      Filesize

      1.0MB

      MD5

      6bfb7ee3c2a436e31e52a538d6497a06

      SHA1

      c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d

      SHA256

      077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06

      SHA512

      6934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exe
      Filesize

      760KB

      MD5

      9a23938da86f8d884e27b0b22c0031d9

      SHA1

      c7f496b472285d44bbae72e01a57c5545cdcc64b

      SHA256

      eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c

      SHA512

      a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exe
      Filesize

      760KB

      MD5

      9a23938da86f8d884e27b0b22c0031d9

      SHA1

      c7f496b472285d44bbae72e01a57c5545cdcc64b

      SHA256

      eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c

      SHA512

      a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exe
      Filesize

      578KB

      MD5

      27e17304e5007ad914ccd99bc3aef2df

      SHA1

      136794da62a3b9e0526d434068003ab0f2d1fd2f

      SHA256

      921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402

      SHA512

      05df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exe
      Filesize

      578KB

      MD5

      27e17304e5007ad914ccd99bc3aef2df

      SHA1

      136794da62a3b9e0526d434068003ab0f2d1fd2f

      SHA256

      921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402

      SHA512

      05df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exe
      Filesize

      580KB

      MD5

      19174e3370a22a2bb53b3b397586a020

      SHA1

      336d09fb76bb98d7591888f0781ace269e40c320

      SHA256

      0f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d

      SHA512

      b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exe
      Filesize

      580KB

      MD5

      19174e3370a22a2bb53b3b397586a020

      SHA1

      336d09fb76bb98d7591888f0781ace269e40c320

      SHA256

      0f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d

      SHA512

      b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exe
      Filesize

      169KB

      MD5

      bd3447593725a759f2998e97c8b4aad1

      SHA1

      877b3b4f37ae98b2e9ae1674d5d99d47472ebacd

      SHA256

      9229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b

      SHA512

      65c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exe
      Filesize

      169KB

      MD5

      bd3447593725a759f2998e97c8b4aad1

      SHA1

      877b3b4f37ae98b2e9ae1674d5d99d47472ebacd

      SHA256

      9229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b

      SHA512

      65c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/3040-196-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-210-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-164-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3040-166-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3040-167-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-168-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-170-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-172-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-174-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-176-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-178-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-180-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-182-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-184-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-186-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-188-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-190-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-194-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-192-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-163-0x0000000000A90000-0x0000000000AEB000-memory.dmp
      Filesize

      364KB

    • memory/3040-198-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-200-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-204-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-202-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-206-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-165-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3040-208-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-212-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-214-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-218-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-216-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-220-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-224-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-226-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-228-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-230-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-222-0x0000000004F60000-0x0000000004FC0000-memory.dmp
      Filesize

      384KB

    • memory/3040-2315-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3040-2316-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3040-2317-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3040-2318-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3040-162-0x00000000050D0000-0x0000000005674000-memory.dmp
      Filesize

      5.6MB

    • memory/3872-2331-0x0000000005E30000-0x0000000006448000-memory.dmp
      Filesize

      6.1MB

    • memory/3872-2332-0x0000000005920000-0x0000000005A2A000-memory.dmp
      Filesize

      1.0MB

    • memory/3872-2333-0x00000000055E0000-0x00000000055F2000-memory.dmp
      Filesize

      72KB

    • memory/3872-2334-0x0000000005850000-0x000000000588C000-memory.dmp
      Filesize

      240KB

    • memory/3872-2330-0x0000000000D60000-0x0000000000D8E000-memory.dmp
      Filesize

      184KB

    • memory/3872-2335-0x0000000005600000-0x0000000005610000-memory.dmp
      Filesize

      64KB

    • memory/3872-2342-0x0000000005600000-0x0000000005610000-memory.dmp
      Filesize

      64KB

    • memory/3992-2340-0x0000000000690000-0x00000000006BE000-memory.dmp
      Filesize

      184KB

    • memory/3992-2341-0x00000000027E0000-0x00000000027F0000-memory.dmp
      Filesize

      64KB

    • memory/3992-2343-0x00000000027E0000-0x00000000027F0000-memory.dmp
      Filesize

      64KB