Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 02:59

General

  • Target

    68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e.exe

  • Size

    1.2MB

  • MD5

    36590603cc5bae6ba1f75c3eade33f62

  • SHA1

    8dd445d708c79310b9f3b4a3e9b1f49e01c74eec

  • SHA256

    68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e

  • SHA512

    e7d0ed0373419d4d8bc6c36f4fb1684922c8d65cc28b3318b7199430f3a82fa211c72e61e76dfee0f29a9b6f1c2a732684356379a1abbe5fd1bd031ac4e3e875

  • SSDEEP

    24576:yyjeeuJQb9DeX6uoI3TIHX4b8JBf/jJkHnP9Hd5AdANR9J8u:ZjeeEQpDS6uoIjOXdnf/eHnPdME9

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e.exe
    "C:\Users\Admin\AppData\Local\Temp\68c13af2fe33beaf6bd9c87a0e879488b96a6c06b8d99111726736846ab7695e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2324
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:4464
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe
            5⤵
            • Executes dropped EXE
            PID:2640

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe
    Filesize

    1.0MB

    MD5

    70c4faa5a4823d56055873e8f75afe7f

    SHA1

    cf079e314ff8454bb125db0f665ac272113be729

    SHA256

    b2b27653cef7c514929d774eba716da63e0d56340c100d84b52297e35a99fb67

    SHA512

    a33709a978a8191f1ac0611e453f7e50b1a383b9c34d9a8485990bde8e5d100d32a33293a133c16a1964acc0fa4604cc4673d2a2ccd7fd694afeb371033f32ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59066452.exe
    Filesize

    1.0MB

    MD5

    70c4faa5a4823d56055873e8f75afe7f

    SHA1

    cf079e314ff8454bb125db0f665ac272113be729

    SHA256

    b2b27653cef7c514929d774eba716da63e0d56340c100d84b52297e35a99fb67

    SHA512

    a33709a978a8191f1ac0611e453f7e50b1a383b9c34d9a8485990bde8e5d100d32a33293a133c16a1964acc0fa4604cc4673d2a2ccd7fd694afeb371033f32ab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe
    Filesize

    764KB

    MD5

    3eebbe237414a30dbba1ecc991c8583e

    SHA1

    ca9a61a17cdd754f9851f9d406fa29892b4b58b0

    SHA256

    950f743af1a019f985b64803f6c89f8acfac50b1a2751e0f331a4e7b229be891

    SHA512

    8c0f416dcfd659f0bb2b1b6328c774468b7d1835d233c93a17c68d879e2acbf698314ea1929941d94f37c016914e6f17049d82d44964993a74b5399632c20351

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39035050.exe
    Filesize

    764KB

    MD5

    3eebbe237414a30dbba1ecc991c8583e

    SHA1

    ca9a61a17cdd754f9851f9d406fa29892b4b58b0

    SHA256

    950f743af1a019f985b64803f6c89f8acfac50b1a2751e0f331a4e7b229be891

    SHA512

    8c0f416dcfd659f0bb2b1b6328c774468b7d1835d233c93a17c68d879e2acbf698314ea1929941d94f37c016914e6f17049d82d44964993a74b5399632c20351

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe
    Filesize

    581KB

    MD5

    f61ba403a82773affa5524bc3476fcd7

    SHA1

    1e20de2a1f0bc636e3e1a9b548efeef5b627f412

    SHA256

    086ef68db2e1330fdf68903cb80e1ae4c0207598cd7d1170a6a05eee7bd99645

    SHA512

    1f40cadcf1a22a350b3aee61423d2182741cdc644e7989e69cf03f45b1bede6b9e32b35d4ce83aa0ae7e84471f9376186f73f27e76501961c8eedbb671454f90

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05847434.exe
    Filesize

    581KB

    MD5

    f61ba403a82773affa5524bc3476fcd7

    SHA1

    1e20de2a1f0bc636e3e1a9b548efeef5b627f412

    SHA256

    086ef68db2e1330fdf68903cb80e1ae4c0207598cd7d1170a6a05eee7bd99645

    SHA512

    1f40cadcf1a22a350b3aee61423d2182741cdc644e7989e69cf03f45b1bede6b9e32b35d4ce83aa0ae7e84471f9376186f73f27e76501961c8eedbb671454f90

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe
    Filesize

    582KB

    MD5

    ade13a12be52f244a2351da782e2d6db

    SHA1

    c7d9a4b3ab06e6fa542e05113ccd0c4e3f330dd7

    SHA256

    2986455438e269e55a6438aab80859c9437a8f8d02d542c85a6fe91a5d05c37f

    SHA512

    eaf9bc08a0ec4fb8b95c173f5b36d5d8946a3c3b22a0a37556cf9f6bba139ef0ab9f9447f42dfc6430703ffe0a7c7549f3a72dea08aee64c5ab0bf4f19eb902c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s82651924.exe
    Filesize

    582KB

    MD5

    ade13a12be52f244a2351da782e2d6db

    SHA1

    c7d9a4b3ab06e6fa542e05113ccd0c4e3f330dd7

    SHA256

    2986455438e269e55a6438aab80859c9437a8f8d02d542c85a6fe91a5d05c37f

    SHA512

    eaf9bc08a0ec4fb8b95c173f5b36d5d8946a3c3b22a0a37556cf9f6bba139ef0ab9f9447f42dfc6430703ffe0a7c7549f3a72dea08aee64c5ab0bf4f19eb902c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe
    Filesize

    169KB

    MD5

    356867c2250240a4d0a0743bb203fc5b

    SHA1

    7b3f092a7bed48a81143668f093219a0da65aa61

    SHA256

    8f469fc2d1b52e97fd2632598d3373908c325e07a07de60267657e313713459d

    SHA512

    0b11e008d9cd4450e144a15db09e2edc80757efc530306cc48c1e94da747025852ded4bc042cfa59dd889ee9ed7355700ecf98a67a8331fbdbf56ce2efd0ff39

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t75715869.exe
    Filesize

    169KB

    MD5

    356867c2250240a4d0a0743bb203fc5b

    SHA1

    7b3f092a7bed48a81143668f093219a0da65aa61

    SHA256

    8f469fc2d1b52e97fd2632598d3373908c325e07a07de60267657e313713459d

    SHA512

    0b11e008d9cd4450e144a15db09e2edc80757efc530306cc48c1e94da747025852ded4bc042cfa59dd889ee9ed7355700ecf98a67a8331fbdbf56ce2efd0ff39

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/2324-190-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-206-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-164-0x00000000025D0000-0x00000000025E0000-memory.dmp
    Filesize

    64KB

  • memory/2324-165-0x00000000025D0000-0x00000000025E0000-memory.dmp
    Filesize

    64KB

  • memory/2324-166-0x0000000005120000-0x00000000056C4000-memory.dmp
    Filesize

    5.6MB

  • memory/2324-167-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-168-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-170-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-172-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-178-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-176-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-180-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-174-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-182-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-184-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-186-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-188-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-162-0x0000000000840000-0x000000000089B000-memory.dmp
    Filesize

    364KB

  • memory/2324-192-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-194-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-196-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-198-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-200-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-202-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-204-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-163-0x00000000025D0000-0x00000000025E0000-memory.dmp
    Filesize

    64KB

  • memory/2324-208-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-210-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-212-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-214-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-216-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-218-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-220-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-222-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-224-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-226-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-228-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-230-0x00000000056D0000-0x0000000005730000-memory.dmp
    Filesize

    384KB

  • memory/2324-2315-0x00000000025D0000-0x00000000025E0000-memory.dmp
    Filesize

    64KB

  • memory/2324-2316-0x00000000025D0000-0x00000000025E0000-memory.dmp
    Filesize

    64KB

  • memory/2640-2333-0x0000000000CA0000-0x0000000000CCE000-memory.dmp
    Filesize

    184KB

  • memory/2640-2335-0x00000000056F0000-0x00000000057FA000-memory.dmp
    Filesize

    1.0MB

  • memory/2640-2336-0x0000000005600000-0x0000000005612000-memory.dmp
    Filesize

    72KB

  • memory/2640-2339-0x00000000054D0000-0x00000000054E0000-memory.dmp
    Filesize

    64KB

  • memory/2640-2341-0x00000000054D0000-0x00000000054E0000-memory.dmp
    Filesize

    64KB

  • memory/4464-2329-0x0000000000680000-0x00000000006AE000-memory.dmp
    Filesize

    184KB

  • memory/4464-2334-0x00000000055E0000-0x0000000005BF8000-memory.dmp
    Filesize

    6.1MB

  • memory/4464-2337-0x0000000005040000-0x000000000507C000-memory.dmp
    Filesize

    240KB

  • memory/4464-2338-0x0000000004FB0000-0x0000000004FC0000-memory.dmp
    Filesize

    64KB

  • memory/4464-2340-0x0000000004FB0000-0x0000000004FC0000-memory.dmp
    Filesize

    64KB