Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe
Resource
win10v2004-20230220-en
General
-
Target
25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe
-
Size
708KB
-
MD5
c001455b5f15fa986bce6720ab365936
-
SHA1
45fe7b025df83e5ef3be5c078fa8a69d5aee60cc
-
SHA256
25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5
-
SHA512
af6bfa9a08986a7bb32844f3d4e0e1fced70c4eb3b703e17e5d29426c60754516c89e58f035928c71ce1c10de02d705c1ed3d6b62ebf03ef8876485813f83414
-
SSDEEP
12288:fMrby90+NYzzM2dLbs4yAVSggEUSqhg00EJ+oZQAYK4HUtgeDIkaX7T1Mu:Uyi/M2B0AVx5USqhDFZ7YbcDI/X75Mu
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/5100-148-0x00000000076A0000-0x0000000007CB8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 1452 x5132221.exe 5100 g9196368.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5132221.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5132221.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4248 wrote to memory of 1452 4248 25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe 82 PID 4248 wrote to memory of 1452 4248 25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe 82 PID 4248 wrote to memory of 1452 4248 25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe 82 PID 1452 wrote to memory of 5100 1452 x5132221.exe 83 PID 1452 wrote to memory of 5100 1452 x5132221.exe 83 PID 1452 wrote to memory of 5100 1452 x5132221.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe"C:\Users\Admin\AppData\Local\Temp\25070e5f071bd838bd5c95d172baa2653cb28bec50ad39209529a4c58775eef5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5132221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5132221.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9196368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9196368.exe3⤵
- Executes dropped EXE
PID:5100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD59f67a98e76dc11f36dd11fdbde51cc4f
SHA193d28afc85c9868c857429b8f023f7f757a68c08
SHA25664e7151e1982fea3a78da17477c766c013502a8a685737dfc62b9bea71f9f220
SHA512ef8aadd205ea000fe4f4f4e5617eed7b36f8f4df31e63d2143972a8d5f6f80c8b24ea565866d7bfddfab218812da4a7db3596a35fe61e744a1f63431fa624697
-
Filesize
416KB
MD59f67a98e76dc11f36dd11fdbde51cc4f
SHA193d28afc85c9868c857429b8f023f7f757a68c08
SHA25664e7151e1982fea3a78da17477c766c013502a8a685737dfc62b9bea71f9f220
SHA512ef8aadd205ea000fe4f4f4e5617eed7b36f8f4df31e63d2143972a8d5f6f80c8b24ea565866d7bfddfab218812da4a7db3596a35fe61e744a1f63431fa624697
-
Filesize
136KB
MD56206c64ec5a5af999f80fc24be7614fd
SHA1225446f51a722fd24eaaf7dd8257d45e404657db
SHA2565d7eceac2066ad4dc7d32a1b3a311d9b7e0a6f02df049adbe39fdf1d11b8ebde
SHA512dc8d1898016c19e66949c6abb8b029fd5f9c025441aaf45b89d652580f954d3da5d0b6e3ad9c06c4319f8bc4c6659e21270016beb2328b666bd280b7a0f7893f
-
Filesize
136KB
MD56206c64ec5a5af999f80fc24be7614fd
SHA1225446f51a722fd24eaaf7dd8257d45e404657db
SHA2565d7eceac2066ad4dc7d32a1b3a311d9b7e0a6f02df049adbe39fdf1d11b8ebde
SHA512dc8d1898016c19e66949c6abb8b029fd5f9c025441aaf45b89d652580f954d3da5d0b6e3ad9c06c4319f8bc4c6659e21270016beb2328b666bd280b7a0f7893f