Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe
Resource
win10v2004-20230220-en
General
-
Target
0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe
-
Size
643KB
-
MD5
23693d58857ce79fbb62ad6e1590dabd
-
SHA1
d31d7b29330c0b864f908604eb73824d23642dc6
-
SHA256
0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8
-
SHA512
5d07c656f8de2fc0aaeaadfc01d3b38ef724fecf2dc9dd5427ab6a28d13f45dbd4adb0c30cd508f29ced700e3b3eda54540849ef2b63c6a288726e3914f98979
-
SSDEEP
12288:vMr3y90nmZ4qQIcn+o5JachYZ3R8keACR966IFyOVMLlzL1fS:UyhXc+o5scEh8X66uyO0L1q
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3904-148-0x00000000054A0000-0x0000000005AB8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 4560 x2020685.exe 3904 g7895368.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2020685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2020685.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4560 4124 0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe 84 PID 4124 wrote to memory of 4560 4124 0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe 84 PID 4124 wrote to memory of 4560 4124 0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe 84 PID 4560 wrote to memory of 3904 4560 x2020685.exe 85 PID 4560 wrote to memory of 3904 4560 x2020685.exe 85 PID 4560 wrote to memory of 3904 4560 x2020685.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe"C:\Users\Admin\AppData\Local\Temp\0f4c5547a09a7131c7e1e855f1e5469779e8a2242d9a581eee717906fd4d69d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2020685.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2020685.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7895368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7895368.exe3⤵
- Executes dropped EXE
PID:3904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD593f8a85c9caedb6cd7d72893fc5f04a0
SHA19c45ab122990f593bd4dadc0a274282ff6ecb81f
SHA256d5091f453faec384437b3c4e7fd345f16c46d3003c015b32c46d946b5a9e1f2b
SHA51272f0e84be9cccac6a13da4b687fdde1f0f311d5706fda993dcd9eaa6aab08e3aab90f7dfa0904f1b156e1c2edf8bd60e6596aaf54d0f9e148de603a519b2d6b0
-
Filesize
383KB
MD593f8a85c9caedb6cd7d72893fc5f04a0
SHA19c45ab122990f593bd4dadc0a274282ff6ecb81f
SHA256d5091f453faec384437b3c4e7fd345f16c46d3003c015b32c46d946b5a9e1f2b
SHA51272f0e84be9cccac6a13da4b687fdde1f0f311d5706fda993dcd9eaa6aab08e3aab90f7dfa0904f1b156e1c2edf8bd60e6596aaf54d0f9e148de603a519b2d6b0
-
Filesize
168KB
MD58c29a78514c0c95f91df7c2780855604
SHA149ea7d31a3ebc76c89bcd9213ee3f8940311afc2
SHA2561dafb53940d8c9ce35decc5ce7e92fc8abbed7af73bb04f22cfe3b2976d877b4
SHA51264c0270ec1a229a29dc940e9e480ffc1040f3b3c9d30d1a623dc8d9d9931a0423e0861b9f4cd1ff84e9a472c1b5c54d1cd99b77b98e519827ddc7c91e7fe0e5b
-
Filesize
168KB
MD58c29a78514c0c95f91df7c2780855604
SHA149ea7d31a3ebc76c89bcd9213ee3f8940311afc2
SHA2561dafb53940d8c9ce35decc5ce7e92fc8abbed7af73bb04f22cfe3b2976d877b4
SHA51264c0270ec1a229a29dc940e9e480ffc1040f3b3c9d30d1a623dc8d9d9931a0423e0861b9f4cd1ff84e9a472c1b5c54d1cd99b77b98e519827ddc7c91e7fe0e5b