Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe
Resource
win10v2004-20230220-en
General
-
Target
093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe
-
Size
774KB
-
MD5
111938b15b7b8180b2ad097e7e25381b
-
SHA1
575641b80819925a9e6b0fd8976014142dd685bc
-
SHA256
093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3
-
SHA512
e5feed06510d4581db16cee560f8ecb848cc3b2036d94b7164203053ba35fa7db769d38a44827fd6d4a6b2febd3c8b083087e1edb3a0f667f24e69e866ba0419
-
SSDEEP
24576:tysYxLWnyZgqc14s+918P5NcFv0ZZDOvQ:IskKL14Z918xNcF8DDS
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1272-2314-0x0000000005D40000-0x0000000006358000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation m85157131.exe -
Executes dropped EXE 4 IoCs
pid Process 2932 x12740388.exe 1144 m85157131.exe 1272 1.exe 2232 n21928604.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x12740388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x12740388.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 404 1144 WerFault.exe 87 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1144 m85157131.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 548 wrote to memory of 2932 548 093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe 86 PID 548 wrote to memory of 2932 548 093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe 86 PID 548 wrote to memory of 2932 548 093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe 86 PID 2932 wrote to memory of 1144 2932 x12740388.exe 87 PID 2932 wrote to memory of 1144 2932 x12740388.exe 87 PID 2932 wrote to memory of 1144 2932 x12740388.exe 87 PID 1144 wrote to memory of 1272 1144 m85157131.exe 88 PID 1144 wrote to memory of 1272 1144 m85157131.exe 88 PID 1144 wrote to memory of 1272 1144 m85157131.exe 88 PID 2932 wrote to memory of 2232 2932 x12740388.exe 92 PID 2932 wrote to memory of 2232 2932 x12740388.exe 92 PID 2932 wrote to memory of 2232 2932 x12740388.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe"C:\Users\Admin\AppData\Local\Temp\093d6359952f3cad52a12d8b0b0001d174dc4d5605af50a7c5b8d8063d43d2e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x12740388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x12740388.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m85157131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m85157131.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 13724⤵
- Program crash
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n21928604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n21928604.exe3⤵
- Executes dropped EXE
PID:2232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1144 -ip 11441⤵PID:4320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5d5bd327a7eff5b76fbcda95221c49006
SHA1385f9ab313a5607f21cc32422a55c1fbe5f051ba
SHA2561d334412f2f2cf839618846c738fe30e2e07fc7abfe01dab16227eac30104fd6
SHA512699a3a3315a5c1193d45324d5dce9174b3930215caf9bd3389d82a5be6f772456932d430113c4a4e6c16236405ca7ede4032bd40ff222c951a4b78aee1d9b3fd
-
Filesize
570KB
MD5d5bd327a7eff5b76fbcda95221c49006
SHA1385f9ab313a5607f21cc32422a55c1fbe5f051ba
SHA2561d334412f2f2cf839618846c738fe30e2e07fc7abfe01dab16227eac30104fd6
SHA512699a3a3315a5c1193d45324d5dce9174b3930215caf9bd3389d82a5be6f772456932d430113c4a4e6c16236405ca7ede4032bd40ff222c951a4b78aee1d9b3fd
-
Filesize
488KB
MD5a6913272723d49f3b159a9f38a351d88
SHA1f9068afbad50e1b09346af421694d4faa7dc3127
SHA256440ba739fede851d8c3505f61b28b5acbc341a7829fefc15dbb6a773ada72f22
SHA51256a658617e288ac7bb2ab172d0d99d198cc4b4de674198d71dd46260208a586cdc4176086e70cc8683621d43c9bf74e45acd2c4ba20d50a73a6afb1dce0cac56
-
Filesize
488KB
MD5a6913272723d49f3b159a9f38a351d88
SHA1f9068afbad50e1b09346af421694d4faa7dc3127
SHA256440ba739fede851d8c3505f61b28b5acbc341a7829fefc15dbb6a773ada72f22
SHA51256a658617e288ac7bb2ab172d0d99d198cc4b4de674198d71dd46260208a586cdc4176086e70cc8683621d43c9bf74e45acd2c4ba20d50a73a6afb1dce0cac56
-
Filesize
172KB
MD5738d3cb5989a80638e99775887933278
SHA128e29fd66f4b1ca211a31bd8593371490916ac87
SHA256d0d848c8cae5e7584162bc6878d3e739e1412e293ffaf8f7289b63c03bcab5a2
SHA512c89f1d701a0839747309c7feefba9dedbd49a3e4b01a48d98e9925d2474e41b47697ed68081a5b458ef56ff6ad905c01f2e3639a43735bfe1a4d4d5da290c277
-
Filesize
172KB
MD5738d3cb5989a80638e99775887933278
SHA128e29fd66f4b1ca211a31bd8593371490916ac87
SHA256d0d848c8cae5e7584162bc6878d3e739e1412e293ffaf8f7289b63c03bcab5a2
SHA512c89f1d701a0839747309c7feefba9dedbd49a3e4b01a48d98e9925d2474e41b47697ed68081a5b458ef56ff6ad905c01f2e3639a43735bfe1a4d4d5da290c277
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf