Analysis
-
max time kernel
149s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:09
Static task
static1
Behavioral task
behavioral1
Sample
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe
Resource
win10v2004-20230220-en
General
-
Target
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe
-
Size
775KB
-
MD5
4d53b8ad04b18d56e3f7f90d64f16547
-
SHA1
a52072ba473f6d01938b3eb654c1386d7fe6d8e9
-
SHA256
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8
-
SHA512
c9b7af65081cd33ace336ad298a7b7064a80188e439eba248fa0068cab24a274400e44b9e99a72759b8dc3b0f05587a3548c7f6c531eb739914b1b6a134c5364
-
SSDEEP
12288:5y90NVjGiP02zMU71LBU42fgTxsBkseUWdLZrscleOGx+3gW79YNCUU2:5yEVCiP0DKtUJkxSyst3+3jp2
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/5092-2317-0x00000000050C0000-0x00000000056D8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation m56353608.exe -
Executes dropped EXE 4 IoCs
pid Process 5064 x36773761.exe 2552 m56353608.exe 5092 1.exe 3364 n98936922.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x36773761.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x36773761.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1892 2552 WerFault.exe 87 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 m56353608.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3684 wrote to memory of 5064 3684 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 86 PID 3684 wrote to memory of 5064 3684 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 86 PID 3684 wrote to memory of 5064 3684 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 86 PID 5064 wrote to memory of 2552 5064 x36773761.exe 87 PID 5064 wrote to memory of 2552 5064 x36773761.exe 87 PID 5064 wrote to memory of 2552 5064 x36773761.exe 87 PID 2552 wrote to memory of 5092 2552 m56353608.exe 91 PID 2552 wrote to memory of 5092 2552 m56353608.exe 91 PID 2552 wrote to memory of 5092 2552 m56353608.exe 91 PID 5064 wrote to memory of 3364 5064 x36773761.exe 97 PID 5064 wrote to memory of 3364 5064 x36773761.exe 97 PID 5064 wrote to memory of 3364 5064 x36773761.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe"C:\Users\Admin\AppData\Local\Temp\2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x36773761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x36773761.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m56353608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m56353608.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 13284⤵
- Program crash
PID:1892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n98936922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n98936922.exe3⤵
- Executes dropped EXE
PID:3364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2552 -ip 25521⤵PID:3164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD513240711a97ec37015fc66c3f72bcf18
SHA1d0304cff87f7149e726e9c852cad1adc4559a091
SHA256b0e76d869b922664cc23d243b7a4b15e393a930f429d0d3c59f6617a0eb600fe
SHA5120144a444bcef9b49dc737f3538ddd7dfe1002a4129941a2f01de2d908f04d16d9fedb008a5155b3d401c6432609f10e3a83ead88252775c0f5ef01b114c750a7
-
Filesize
570KB
MD513240711a97ec37015fc66c3f72bcf18
SHA1d0304cff87f7149e726e9c852cad1adc4559a091
SHA256b0e76d869b922664cc23d243b7a4b15e393a930f429d0d3c59f6617a0eb600fe
SHA5120144a444bcef9b49dc737f3538ddd7dfe1002a4129941a2f01de2d908f04d16d9fedb008a5155b3d401c6432609f10e3a83ead88252775c0f5ef01b114c750a7
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
169KB
MD5a87259ed4808815deb3213735f9d51b3
SHA1eddddbd295a07c2e14a39817a3cef80035aa5a15
SHA256548e3dd7a4a3e3bc5f6bb53f52483e66154776727d8126cb0874c5c076d6073b
SHA51286ae950905876e8b095896bd032b33a9163757d87e1d66674af40efe8abbd2b81bc5cf3a205ab6a89377a5daf8aea8a816d6d914f0d5bb19a713fc215ac11c3c
-
Filesize
169KB
MD5a87259ed4808815deb3213735f9d51b3
SHA1eddddbd295a07c2e14a39817a3cef80035aa5a15
SHA256548e3dd7a4a3e3bc5f6bb53f52483e66154776727d8126cb0874c5c076d6073b
SHA51286ae950905876e8b095896bd032b33a9163757d87e1d66674af40efe8abbd2b81bc5cf3a205ab6a89377a5daf8aea8a816d6d914f0d5bb19a713fc215ac11c3c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf