Analysis

  • max time kernel
    150s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:26

General

  • Target

    0c03b14f843778ebe345b53f57fe11fd8dd19e40d001179d1ce338a753413f4a.exe

  • Size

    794KB

  • MD5

    3df473b73038d4c3ecc34b061119e4b6

  • SHA1

    8803b3ed47adaa5b938d05e2e9c755263221430f

  • SHA256

    0c03b14f843778ebe345b53f57fe11fd8dd19e40d001179d1ce338a753413f4a

  • SHA512

    a58659314f2b4366b7f68667ae0cd1a7357323c6a4185cfa1d14c857c3775fbdae13b3d35c61019ed71f53bf087178a79b5826bddc23d82ca2e67a7bdf760d9e

  • SSDEEP

    12288:Oy90MHSYAtlwlAOPE+XkAraPWziasCQrTq+2uKB7YtXZy8orpTDN:OytHE+XJraPWziasCQXH/KB7wJqpTDN

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dork

C2

185.161.248.73:4164

Attributes
  • auth_value

    e81be7d6cfb453cc812e1b4890eeadad

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c03b14f843778ebe345b53f57fe11fd8dd19e40d001179d1ce338a753413f4a.exe
    "C:\Users\Admin\AppData\Local\Temp\0c03b14f843778ebe345b53f57fe11fd8dd19e40d001179d1ce338a753413f4a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x15512046.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x15512046.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m98182546.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m98182546.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:1888
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 1384
          4⤵
          • Program crash
          PID:3348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n10657877.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n10657877.exe
        3⤵
        • Executes dropped EXE
        PID:836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4504 -ip 4504
    1⤵
      PID:4852

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x15512046.exe

            Filesize

            590KB

            MD5

            41c2b7c3d9c9e27e1c45b45084096e22

            SHA1

            49439c4d9920d249583bb506f14600a16a209600

            SHA256

            85b377c933ed4afc2ad296a4aa9be13d143b2cf376ff1350dc855017f27aaa08

            SHA512

            a1bb9ac827ec7c8cb8064e397fe81c1f31b085aad92eab9f9a6494d40ae9e2a9a58d2256f03ed9f6ecde3e7d306e43ce58b801d097c588cf0c9ff9bb7c88c93e

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x15512046.exe

            Filesize

            590KB

            MD5

            41c2b7c3d9c9e27e1c45b45084096e22

            SHA1

            49439c4d9920d249583bb506f14600a16a209600

            SHA256

            85b377c933ed4afc2ad296a4aa9be13d143b2cf376ff1350dc855017f27aaa08

            SHA512

            a1bb9ac827ec7c8cb8064e397fe81c1f31b085aad92eab9f9a6494d40ae9e2a9a58d2256f03ed9f6ecde3e7d306e43ce58b801d097c588cf0c9ff9bb7c88c93e

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m98182546.exe

            Filesize

            530KB

            MD5

            89680d85c8691475b484998702ec71e6

            SHA1

            105d3572f78c01b7d1aefe2fc1f67dd593f81158

            SHA256

            b7b8fa713cfd4bb65608191650eca78f2dbf257f64aa89318afbb4e8078a14de

            SHA512

            453aededaaf319439c73614de6a3a3d2c20009803a6b380c4beadf5db1ecd79f0508c9a5b88752c4a0feefbeabe4c9a6d4aba95f2d129af4de1e2caf788ea8ff

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m98182546.exe

            Filesize

            530KB

            MD5

            89680d85c8691475b484998702ec71e6

            SHA1

            105d3572f78c01b7d1aefe2fc1f67dd593f81158

            SHA256

            b7b8fa713cfd4bb65608191650eca78f2dbf257f64aa89318afbb4e8078a14de

            SHA512

            453aededaaf319439c73614de6a3a3d2c20009803a6b380c4beadf5db1ecd79f0508c9a5b88752c4a0feefbeabe4c9a6d4aba95f2d129af4de1e2caf788ea8ff

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n10657877.exe

            Filesize

            168KB

            MD5

            27ec968399819a6f4710849a9d0dde7f

            SHA1

            ac5da1dd9ce8c6feb2f710d7383bcef7feb02185

            SHA256

            f1b8ccc127c2d8600d93fdfebc8785b200a2b1f47390e62117377c0f20713f1a

            SHA512

            37b56199f7e73178db304fc0fc20d8c842842d13d98aef36c30f397d0ca567be110ce8c6fd9195d4b24d0bb63e5b06f9d20d5313985ccad8eaa99c56f88f0797

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n10657877.exe

            Filesize

            168KB

            MD5

            27ec968399819a6f4710849a9d0dde7f

            SHA1

            ac5da1dd9ce8c6feb2f710d7383bcef7feb02185

            SHA256

            f1b8ccc127c2d8600d93fdfebc8785b200a2b1f47390e62117377c0f20713f1a

            SHA512

            37b56199f7e73178db304fc0fc20d8c842842d13d98aef36c30f397d0ca567be110ce8c6fd9195d4b24d0bb63e5b06f9d20d5313985ccad8eaa99c56f88f0797

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • memory/836-2330-0x0000000004F50000-0x0000000004F60000-memory.dmp

            Filesize

            64KB

          • memory/836-2327-0x00000000006A0000-0x00000000006D0000-memory.dmp

            Filesize

            192KB

          • memory/836-2328-0x0000000004F50000-0x0000000004F60000-memory.dmp

            Filesize

            64KB

          • memory/1888-2322-0x0000000004FE0000-0x000000000501C000-memory.dmp

            Filesize

            240KB

          • memory/1888-2321-0x0000000004D90000-0x0000000004DA0000-memory.dmp

            Filesize

            64KB

          • memory/1888-2319-0x0000000004D40000-0x0000000004D52000-memory.dmp

            Filesize

            72KB

          • memory/1888-2318-0x00000000050B0000-0x00000000051BA000-memory.dmp

            Filesize

            1.0MB

          • memory/1888-2317-0x00000000055C0000-0x0000000005BD8000-memory.dmp

            Filesize

            6.1MB

          • memory/1888-2316-0x00000000004C0000-0x00000000004EE000-memory.dmp

            Filesize

            184KB

          • memory/1888-2329-0x0000000004D90000-0x0000000004DA0000-memory.dmp

            Filesize

            64KB

          • memory/4504-164-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-214-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-176-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-178-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-180-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-182-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-184-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-186-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-188-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-190-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-192-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-194-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-196-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-198-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-200-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-202-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-204-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-206-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-208-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-210-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-212-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-174-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-216-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-2300-0x0000000002B90000-0x0000000002BA0000-memory.dmp

            Filesize

            64KB

          • memory/4504-2301-0x0000000002B90000-0x0000000002BA0000-memory.dmp

            Filesize

            64KB

          • memory/4504-2303-0x0000000002B90000-0x0000000002BA0000-memory.dmp

            Filesize

            64KB

          • memory/4504-172-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-170-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-168-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-166-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-162-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-159-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-160-0x0000000002B90000-0x0000000002BA0000-memory.dmp

            Filesize

            64KB

          • memory/4504-157-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-155-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-153-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-152-0x0000000002B30000-0x0000000002B90000-memory.dmp

            Filesize

            384KB

          • memory/4504-151-0x00000000052C0000-0x0000000005864000-memory.dmp

            Filesize

            5.6MB

          • memory/4504-150-0x0000000002B90000-0x0000000002BA0000-memory.dmp

            Filesize

            64KB

          • memory/4504-149-0x0000000002B90000-0x0000000002BA0000-memory.dmp

            Filesize

            64KB

          • memory/4504-148-0x0000000002760000-0x00000000027BB000-memory.dmp

            Filesize

            364KB