Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:56
Static task
static1
Behavioral task
behavioral1
Sample
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe
Resource
win10v2004-20230220-en
General
-
Target
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe
-
Size
775KB
-
MD5
e0a0df607e1013aea0028806391597be
-
SHA1
c37d66eb8eef33e9130864cf82dcba08f2656bb6
-
SHA256
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5
-
SHA512
f9f034c4f9de4db219d5fe98032b4297ea30b58fdcc51510466e19ecb911adddf458d0659b11ab9e785cd6faa2b30e2af4658bc9d1f69884a8367ff8d57186c5
-
SSDEEP
12288:Iy90enFX4LMNTX9JcLCb2WBpWO67ycq1BVj9TFXEbwvC2xwh+E4s:Iynx4GX9ACBSFq1BVhTF0bwvC2fbs
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4568-2317-0x00000000056A0000-0x0000000005CB8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m90678940.exe -
Executes dropped EXE 4 IoCs
pid Process 1800 x37066951.exe 1400 m90678940.exe 4568 1.exe 1608 n39911236.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x37066951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x37066951.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2716 1400 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1400 m90678940.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1800 3524 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 84 PID 3524 wrote to memory of 1800 3524 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 84 PID 3524 wrote to memory of 1800 3524 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 84 PID 1800 wrote to memory of 1400 1800 x37066951.exe 85 PID 1800 wrote to memory of 1400 1800 x37066951.exe 85 PID 1800 wrote to memory of 1400 1800 x37066951.exe 85 PID 1400 wrote to memory of 4568 1400 m90678940.exe 92 PID 1400 wrote to memory of 4568 1400 m90678940.exe 92 PID 1400 wrote to memory of 4568 1400 m90678940.exe 92 PID 1800 wrote to memory of 1608 1800 x37066951.exe 96 PID 1800 wrote to memory of 1608 1800 x37066951.exe 96 PID 1800 wrote to memory of 1608 1800 x37066951.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe"C:\Users\Admin\AppData\Local\Temp\532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x37066951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x37066951.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m90678940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m90678940.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 13724⤵
- Program crash
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n39911236.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n39911236.exe3⤵
- Executes dropped EXE
PID:1608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1400 -ip 14001⤵PID:4392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5f8b2f15b0f8dca991d9c9496e8f017af
SHA12bd3fffd44f338c90b3f2f55a7fc182d18046ed7
SHA25675697ef25a497b97b89e128189132b680bcda5ea0e09b36a053744679a549e46
SHA512cce30d13915d228646f48984a1410a6e60602bfefbc5591be2fd0c37810fabade06acd858d8e8b37ddc09d5d24bc108b37e078fa4b95754f74b5c37037572c23
-
Filesize
570KB
MD5f8b2f15b0f8dca991d9c9496e8f017af
SHA12bd3fffd44f338c90b3f2f55a7fc182d18046ed7
SHA25675697ef25a497b97b89e128189132b680bcda5ea0e09b36a053744679a549e46
SHA512cce30d13915d228646f48984a1410a6e60602bfefbc5591be2fd0c37810fabade06acd858d8e8b37ddc09d5d24bc108b37e078fa4b95754f74b5c37037572c23
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
172KB
MD58abb54c7ebf2f501b94b5e27a77251d5
SHA195985f802d9d8f97ed0a0ba7a7336e0c9c44c114
SHA256022fc3c7219b64264068aa7831b97e829980b79001a52f67a71411f7c0d711ef
SHA5122445e48e732db1369a6025c7b974b8d0f06478acc1aa21e1383eb5ffc7be9675f98d81f6c4c32cb142dfb6d244da77aa3169e975d8e12a541fde97e7bf2d2d69
-
Filesize
172KB
MD58abb54c7ebf2f501b94b5e27a77251d5
SHA195985f802d9d8f97ed0a0ba7a7336e0c9c44c114
SHA256022fc3c7219b64264068aa7831b97e829980b79001a52f67a71411f7c0d711ef
SHA5122445e48e732db1369a6025c7b974b8d0f06478acc1aa21e1383eb5ffc7be9675f98d81f6c4c32cb142dfb6d244da77aa3169e975d8e12a541fde97e7bf2d2d69
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf