Analysis

  • max time kernel
    152s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 07:55

General

  • Target

    e5bf3a8567e73fcb4b53140c0c04bfa3bbbc18e8045903701e9da29e1858785b.exe

  • Size

    851KB

  • MD5

    875e072932f0fecdf3d2bd28da5df115

  • SHA1

    3aa1adbb0b20f91401c8dafea890f2bf5f82fd2e

  • SHA256

    e5bf3a8567e73fcb4b53140c0c04bfa3bbbc18e8045903701e9da29e1858785b

  • SHA512

    d9c260916cbce5f97b8717acb7cbe09db726377aeba1b13e55fc32211d10924acda5e04566f82a1e73d1b87ad5781aebc32a2485fc655e129c79a8f42151efe0

  • SSDEEP

    12288:7y90y9hku3+iJWVToParWmPISvA3C/zsaX437KvOZuWc4vdGGPHKiTQh9QN7zy90:7ytZ3v4FrWFSo3tKdB49HtTLvuMWY

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5bf3a8567e73fcb4b53140c0c04bfa3bbbc18e8045903701e9da29e1858785b.exe
    "C:\Users\Admin\AppData\Local\Temp\e5bf3a8567e73fcb4b53140c0c04bfa3bbbc18e8045903701e9da29e1858785b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03167197.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03167197.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p15904255.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p15904255.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:1660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63738273.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63738273.exe
        3⤵
        • Executes dropped EXE
        PID:4692

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03167197.exe
    Filesize

    570KB

    MD5

    6c5eeeacce20279c36abd307c736c22e

    SHA1

    6d9157ff290caa2eae23b1783ab71db565d88473

    SHA256

    f62852d448fe3b8ceb13641d3fd387217763ae23fc38fe609de0006e4848db49

    SHA512

    bb19683f00c89a0b15c85e4202e6bb6b2076c1ef419b074d6ea5f98619879a4b0d3e41e3a3a3e47fe81c24909a2a8728e4bce012c30c090d9dbe8bc6b9f7be7a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03167197.exe
    Filesize

    570KB

    MD5

    6c5eeeacce20279c36abd307c736c22e

    SHA1

    6d9157ff290caa2eae23b1783ab71db565d88473

    SHA256

    f62852d448fe3b8ceb13641d3fd387217763ae23fc38fe609de0006e4848db49

    SHA512

    bb19683f00c89a0b15c85e4202e6bb6b2076c1ef419b074d6ea5f98619879a4b0d3e41e3a3a3e47fe81c24909a2a8728e4bce012c30c090d9dbe8bc6b9f7be7a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p15904255.exe
    Filesize

    476KB

    MD5

    5954eace74a29622f1f937f2bbcb3149

    SHA1

    df2e6eaacf70d7786a06089a19aad6ed828571f7

    SHA256

    1f2bc0bc587f001eead661b36fe8badcb63f4eb2a9b96c5a4c45aa5dca7330e4

    SHA512

    d1067fc3901ed55077fb5bd219723be2505f29caafca11f39231205394c25da38239945b0cd59579907b04b75b36e102f1849fa09156232da7295a0b3700e1f9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p15904255.exe
    Filesize

    476KB

    MD5

    5954eace74a29622f1f937f2bbcb3149

    SHA1

    df2e6eaacf70d7786a06089a19aad6ed828571f7

    SHA256

    1f2bc0bc587f001eead661b36fe8badcb63f4eb2a9b96c5a4c45aa5dca7330e4

    SHA512

    d1067fc3901ed55077fb5bd219723be2505f29caafca11f39231205394c25da38239945b0cd59579907b04b75b36e102f1849fa09156232da7295a0b3700e1f9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63738273.exe
    Filesize

    169KB

    MD5

    3549cf3482a166f1aeb5cf8f19299c18

    SHA1

    78497bdd7228795019e295a2ff0cfef4aa3581a9

    SHA256

    ae0bc33340bc1ec6d6ee7e0bb10f4130378216dbb648ad812ae5bc15c3fb28fb

    SHA512

    b4d19e8b9717d9b016f67c9609815f7f2a9c35dab8963000ddbe39277e183f48582a6928a905d4e830b95901f82854aa46b944d135fd51a0285b477b3ed00302

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63738273.exe
    Filesize

    169KB

    MD5

    3549cf3482a166f1aeb5cf8f19299c18

    SHA1

    78497bdd7228795019e295a2ff0cfef4aa3581a9

    SHA256

    ae0bc33340bc1ec6d6ee7e0bb10f4130378216dbb648ad812ae5bc15c3fb28fb

    SHA512

    b4d19e8b9717d9b016f67c9609815f7f2a9c35dab8963000ddbe39277e183f48582a6928a905d4e830b95901f82854aa46b944d135fd51a0285b477b3ed00302

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1660-2325-0x000000000A5E0000-0x000000000ABF8000-memory.dmp
    Filesize

    6.1MB

  • memory/1660-2320-0x0000000000180000-0x00000000001AE000-memory.dmp
    Filesize

    184KB

  • memory/1660-2329-0x0000000004AF0000-0x0000000004B00000-memory.dmp
    Filesize

    64KB

  • memory/1660-2331-0x0000000004AF0000-0x0000000004B00000-memory.dmp
    Filesize

    64KB

  • memory/2552-193-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-205-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-163-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-165-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-167-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-169-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-171-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-173-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-175-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-177-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-179-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-181-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-183-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-185-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-187-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-189-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-191-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-161-0x0000000000400000-0x00000000006F8000-memory.dmp
    Filesize

    3.0MB

  • memory/2552-195-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-197-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-199-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-203-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-201-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-160-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-207-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-209-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-211-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-213-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-215-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-1290-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
    Filesize

    64KB

  • memory/2552-1644-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
    Filesize

    64KB

  • memory/2552-1646-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
    Filesize

    64KB

  • memory/2552-2307-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
    Filesize

    64KB

  • memory/2552-158-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-156-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-154-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-153-0x00000000054F0000-0x0000000005550000-memory.dmp
    Filesize

    384KB

  • memory/2552-152-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
    Filesize

    64KB

  • memory/2552-151-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
    Filesize

    64KB

  • memory/2552-148-0x0000000000860000-0x00000000008BB000-memory.dmp
    Filesize

    364KB

  • memory/2552-150-0x0000000004F40000-0x00000000054E4000-memory.dmp
    Filesize

    5.6MB

  • memory/2552-149-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
    Filesize

    64KB

  • memory/4692-2327-0x00000000049C0000-0x00000000049D2000-memory.dmp
    Filesize

    72KB

  • memory/4692-2328-0x0000000004A20000-0x0000000004A5C000-memory.dmp
    Filesize

    240KB

  • memory/4692-2326-0x0000000004A90000-0x0000000004B9A000-memory.dmp
    Filesize

    1.0MB

  • memory/4692-2330-0x0000000004870000-0x0000000004880000-memory.dmp
    Filesize

    64KB

  • memory/4692-2324-0x0000000000070000-0x00000000000A0000-memory.dmp
    Filesize

    192KB

  • memory/4692-2332-0x0000000004870000-0x0000000004880000-memory.dmp
    Filesize

    64KB