Analysis
-
max time kernel
169s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:14
Static task
static1
Behavioral task
behavioral1
Sample
31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe
Resource
win10v2004-20230220-en
General
-
Target
31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe
-
Size
1.5MB
-
MD5
6108d836010313d77b93aa0de9b89894
-
SHA1
8a231e1ea5ef2109fe13a179e524589ad3d29dcb
-
SHA256
31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796
-
SHA512
02a1f21b5a3e19e1c8514f77121589a84c9aa10c39d150d539f283ffdefd285bbf1dd84b869e102888538ce37b350e4f0706744393986031390e9d514374e889
-
SSDEEP
24576:Lyr4bwrkH9EeO8QvaaIAb/S7/obGt4fgmHbf5UIyvIha/MVbbDtckmidUkuHup4:+Gtsv2AujAGQ37/OIh8aVcXrkv
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2024-215-0x00000000059F0000-0x0000000006008000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6927465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6927465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6927465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6927465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6927465.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6927465.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2120 v3052329.exe 488 v3354145.exe 2588 v7273182.exe 2572 v2989093.exe 2720 a6927465.exe 2024 b1618104.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6927465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6927465.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3052329.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3354145.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2989093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3052329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3354145.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7273182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7273182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v2989093.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3852 2720 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 a6927465.exe 2720 a6927465.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 a6927465.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2120 1740 31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe 81 PID 1740 wrote to memory of 2120 1740 31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe 81 PID 1740 wrote to memory of 2120 1740 31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe 81 PID 2120 wrote to memory of 488 2120 v3052329.exe 82 PID 2120 wrote to memory of 488 2120 v3052329.exe 82 PID 2120 wrote to memory of 488 2120 v3052329.exe 82 PID 488 wrote to memory of 2588 488 v3354145.exe 83 PID 488 wrote to memory of 2588 488 v3354145.exe 83 PID 488 wrote to memory of 2588 488 v3354145.exe 83 PID 2588 wrote to memory of 2572 2588 v7273182.exe 84 PID 2588 wrote to memory of 2572 2588 v7273182.exe 84 PID 2588 wrote to memory of 2572 2588 v7273182.exe 84 PID 2572 wrote to memory of 2720 2572 v2989093.exe 85 PID 2572 wrote to memory of 2720 2572 v2989093.exe 85 PID 2572 wrote to memory of 2720 2572 v2989093.exe 85 PID 2572 wrote to memory of 2024 2572 v2989093.exe 89 PID 2572 wrote to memory of 2024 2572 v2989093.exe 89 PID 2572 wrote to memory of 2024 2572 v2989093.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe"C:\Users\Admin\AppData\Local\Temp\31ab3655887de6720f1b0cff9166245b1c5c154b613e01e11a186e04ea24f796.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3052329.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3052329.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3354145.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3354145.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7273182.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7273182.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2989093.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2989093.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6927465.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6927465.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 10967⤵
- Program crash
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1618104.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1618104.exe6⤵
- Executes dropped EXE
PID:2024
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2720 -ip 27201⤵PID:3080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d66a14d9fe340832143e13adfe40dfd4
SHA17b0854d33b916a8f884fbaf8ca7e24299d3a3efd
SHA25688355c120c9908d7cb3cd485c8cea447c1fb1e06edd533902dac9c818c43db23
SHA512accdbf181c77fb9aca93815882cd60ad322d845d0e517a05e680a7880281051ead1eb8d563fd2ae693afa1bba4875f7fe7d444414039f76050e172cbcb0fc0e7
-
Filesize
1.3MB
MD5d66a14d9fe340832143e13adfe40dfd4
SHA17b0854d33b916a8f884fbaf8ca7e24299d3a3efd
SHA25688355c120c9908d7cb3cd485c8cea447c1fb1e06edd533902dac9c818c43db23
SHA512accdbf181c77fb9aca93815882cd60ad322d845d0e517a05e680a7880281051ead1eb8d563fd2ae693afa1bba4875f7fe7d444414039f76050e172cbcb0fc0e7
-
Filesize
866KB
MD536705cac86a74e4e90350c7f2ed45994
SHA1fe534a4a2977496b7d3845698dc5ae606c882786
SHA2563d6885b8280a559655d177d133950fe28a9ac6f058a2dabd372711dec48c45c1
SHA512e0e84c8b0aada07c7694621ea1d6c3f3de9090256a268ba41b72da55c43b2261c6c9be51698e038471417f6114b3ecf037d99651783ef5bb29cbb65c30d2d12b
-
Filesize
866KB
MD536705cac86a74e4e90350c7f2ed45994
SHA1fe534a4a2977496b7d3845698dc5ae606c882786
SHA2563d6885b8280a559655d177d133950fe28a9ac6f058a2dabd372711dec48c45c1
SHA512e0e84c8b0aada07c7694621ea1d6c3f3de9090256a268ba41b72da55c43b2261c6c9be51698e038471417f6114b3ecf037d99651783ef5bb29cbb65c30d2d12b
-
Filesize
662KB
MD5f73d73fd367c0d3f3be7face46f9c58f
SHA1e7dcebd390f8e83e9bc88c356f29c1053a865711
SHA256099f56affa6f84acfdf93fe963c1b8afd48b90d492d8338ba5946e641c3bf6ea
SHA512b595aa5dd5b6957ff42750b5d2c9fb5b675c99f226b32c9ba9873740dc09079481642243721c04ef1eae5e9b0c0b073f37b33b395de3effc26c924f17ab9b3b6
-
Filesize
662KB
MD5f73d73fd367c0d3f3be7face46f9c58f
SHA1e7dcebd390f8e83e9bc88c356f29c1053a865711
SHA256099f56affa6f84acfdf93fe963c1b8afd48b90d492d8338ba5946e641c3bf6ea
SHA512b595aa5dd5b6957ff42750b5d2c9fb5b675c99f226b32c9ba9873740dc09079481642243721c04ef1eae5e9b0c0b073f37b33b395de3effc26c924f17ab9b3b6
-
Filesize
393KB
MD51e45788c3e05942a934c29e7f2c00cad
SHA17b899c5248c9ff0f35e223bd2f03b0c87fd3fbd5
SHA25690930c82c4af36f1036709f20ec45391bd888e8f996eed7d90998d57eef4ee1f
SHA512f3b1936419c9c36a37f2c6088b94a31c7bd0fb39ffde1b3a8ba5e3c7317eede45b6680ae3fecea05bd3e78a1e4bab105b62004234b0a1a977a949d485b6257d4
-
Filesize
393KB
MD51e45788c3e05942a934c29e7f2c00cad
SHA17b899c5248c9ff0f35e223bd2f03b0c87fd3fbd5
SHA25690930c82c4af36f1036709f20ec45391bd888e8f996eed7d90998d57eef4ee1f
SHA512f3b1936419c9c36a37f2c6088b94a31c7bd0fb39ffde1b3a8ba5e3c7317eede45b6680ae3fecea05bd3e78a1e4bab105b62004234b0a1a977a949d485b6257d4
-
Filesize
315KB
MD540a9f0f75a8bb4591dc57f10e26456be
SHA1b0840d51ef8cf349e60a0ece5300d8ef5951a6c8
SHA25621a9cfca5ad0606db96b931cb7b3b57a0da826f0b9028cb6ab5dbf1fb2790a19
SHA512aceb18e90ced3a425fba29da777b1b926b94268c34f11be0ca76b26b33bb5a3dab61c9d70119eb6a46122a18df55fcca0e25a8e853d825a74616e4eec84d0751
-
Filesize
315KB
MD540a9f0f75a8bb4591dc57f10e26456be
SHA1b0840d51ef8cf349e60a0ece5300d8ef5951a6c8
SHA25621a9cfca5ad0606db96b931cb7b3b57a0da826f0b9028cb6ab5dbf1fb2790a19
SHA512aceb18e90ced3a425fba29da777b1b926b94268c34f11be0ca76b26b33bb5a3dab61c9d70119eb6a46122a18df55fcca0e25a8e853d825a74616e4eec84d0751
-
Filesize
168KB
MD59a720a0ec9b1511071468427546e75cf
SHA15061123501cf321837eb73225bcbfec89c87e952
SHA2569633a81383ff1d4de3b564eef7c3bdef3ec2b7ed4d720de9820d98e419215ede
SHA51209b083bda12bfea9f7df30a2ca41b460eea3e497005387fcc525c4aa1d5a60a6ef0ec5bcd354f9de1f2032e8cee17212f19ff4c64b6084120205c1d5820fe7b5
-
Filesize
168KB
MD59a720a0ec9b1511071468427546e75cf
SHA15061123501cf321837eb73225bcbfec89c87e952
SHA2569633a81383ff1d4de3b564eef7c3bdef3ec2b7ed4d720de9820d98e419215ede
SHA51209b083bda12bfea9f7df30a2ca41b460eea3e497005387fcc525c4aa1d5a60a6ef0ec5bcd354f9de1f2032e8cee17212f19ff4c64b6084120205c1d5820fe7b5