Analysis
-
max time kernel
273s -
max time network
345s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe
Resource
win10v2004-20230221-en
General
-
Target
a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe
-
Size
480KB
-
MD5
21176b5237799572b0a96e2e806cf88d
-
SHA1
2b94b698d55cc49067e0ac5db388a449b2dc7f74
-
SHA256
a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33
-
SHA512
30c941ef4615335b3b64eece04d103eb038e1a1c5f1592a3caf818ecea112cbe18b7ebef197a0a1630ae18d5c59d1548927c2c8959cd4eec39754650bdb9949c
-
SSDEEP
12288:tMrYy90BL6k59WVilyHtIJ6bqEq/aHI0p+Mq6UUeCH:ByiOnMYOJTj/aWr7c
Malware Config
Extracted
redline
dion
217.196.96.101:4132
-
auth_value
6e0b6a3255923968b15f61a2c040c5c9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 736 x5264776.exe 624 g7069800.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5264776.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5264776.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 376 wrote to memory of 736 376 a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe 82 PID 376 wrote to memory of 736 376 a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe 82 PID 376 wrote to memory of 736 376 a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe 82 PID 736 wrote to memory of 624 736 x5264776.exe 83 PID 736 wrote to memory of 624 736 x5264776.exe 83 PID 736 wrote to memory of 624 736 x5264776.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe"C:\Users\Admin\AppData\Local\Temp\a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5264776.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5264776.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7069800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7069800.exe3⤵
- Executes dropped EXE
PID:624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5a75a6b9931b7100c54a01018b88f7092
SHA1bee6dade4181a61f11003e5df74ab6ea7cdab54b
SHA25629803e7e4ca1e959ac917455dd626087d55a385334fb402ce8d80d1ce7bfc439
SHA512adb853b15164a7e77177ba2865b68048a3ad6e396fefcba0d1be2241aa2913cc2f2f24f6733344f8777abd0cd5797b924d05e2144dc2fb393cf7fc243c3c0a64
-
Filesize
308KB
MD5a75a6b9931b7100c54a01018b88f7092
SHA1bee6dade4181a61f11003e5df74ab6ea7cdab54b
SHA25629803e7e4ca1e959ac917455dd626087d55a385334fb402ce8d80d1ce7bfc439
SHA512adb853b15164a7e77177ba2865b68048a3ad6e396fefcba0d1be2241aa2913cc2f2f24f6733344f8777abd0cd5797b924d05e2144dc2fb393cf7fc243c3c0a64
-
Filesize
168KB
MD57da678f09885734417bbb01a9609e79f
SHA14e492efe0bedd7f82595cceb01923a2ec430d1ed
SHA256f487d3190aca85b64f1ac9b7928bd477bc503d58e7dc96ba2634a693e2c5b570
SHA512e16aab006e096ff95fcc8249f47f20b1c7d25d8c5b14da172d4fc4aa885c900d309a319e43e26b94a2da9b5494438365514fc530ade266c9bdad14f9fdcd9858
-
Filesize
168KB
MD57da678f09885734417bbb01a9609e79f
SHA14e492efe0bedd7f82595cceb01923a2ec430d1ed
SHA256f487d3190aca85b64f1ac9b7928bd477bc503d58e7dc96ba2634a693e2c5b570
SHA512e16aab006e096ff95fcc8249f47f20b1c7d25d8c5b14da172d4fc4aa885c900d309a319e43e26b94a2da9b5494438365514fc530ade266c9bdad14f9fdcd9858