Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
f72a71a33ff4d6991342c5deb2937834.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
f72a71a33ff4d6991342c5deb2937834.exe
Resource
win10v2004-20230703-en
General
-
Target
f72a71a33ff4d6991342c5deb2937834.exe
-
Size
517KB
-
MD5
f72a71a33ff4d6991342c5deb2937834
-
SHA1
1225841bb5b1c557d7d41a34a4e5a84b809b2696
-
SHA256
f0cf89c10c8b6614b8b36561cecb29e0654d0cf827c4243bd455a1bfb1dd3b48
-
SHA512
21dbcbfe2ef395ab3bd6af211d22830386b2913d18b51ef327654680d26b7b24753d28afa7b63bac56b9963c2cb2d2c9ba9a3ca594995126b8f2f69092556a65
-
SSDEEP
12288:nAfkfv1aRdnQgbgUHmCrG7WFQGAsdrGb3EgN2/O2CXQ:nAfuv182g8UHmCaKdO0/wA
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 2532 x6355326.exe 4860 f5408839.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f72a71a33ff4d6991342c5deb2937834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f72a71a33ff4d6991342c5deb2937834.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6355326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6355326.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 840 wrote to memory of 2532 840 f72a71a33ff4d6991342c5deb2937834.exe 85 PID 840 wrote to memory of 2532 840 f72a71a33ff4d6991342c5deb2937834.exe 85 PID 840 wrote to memory of 2532 840 f72a71a33ff4d6991342c5deb2937834.exe 85 PID 2532 wrote to memory of 4860 2532 x6355326.exe 86 PID 2532 wrote to memory of 4860 2532 x6355326.exe 86 PID 2532 wrote to memory of 4860 2532 x6355326.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f72a71a33ff4d6991342c5deb2937834.exe"C:\Users\Admin\AppData\Local\Temp\f72a71a33ff4d6991342c5deb2937834.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6355326.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6355326.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5408839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5408839.exe3⤵
- Executes dropped EXE
PID:4860
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331KB
MD52e5982a30f8db06a7e00283ee2a0464a
SHA116c4d8b9e0992deb216680daad2be7dee640afe2
SHA2563bcad21a419ee6667673e7e3fcb79a4bf536ffac011d7621177006837a9615f2
SHA51242a72d38f8d92e5bfce73d3a8f09c2c791c4ab7a635d12e74ca908cbf1a08f48b08480460181411f53842e50f6183b692d106a56ca9f1b85595aa407adb6436f
-
Filesize
331KB
MD52e5982a30f8db06a7e00283ee2a0464a
SHA116c4d8b9e0992deb216680daad2be7dee640afe2
SHA2563bcad21a419ee6667673e7e3fcb79a4bf536ffac011d7621177006837a9615f2
SHA51242a72d38f8d92e5bfce73d3a8f09c2c791c4ab7a635d12e74ca908cbf1a08f48b08480460181411f53842e50f6183b692d106a56ca9f1b85595aa407adb6436f
-
Filesize
257KB
MD512846e97ffae23a0cc5fe46c0daa7b86
SHA14fffbd5dee8a3875a7bb61a5faa6155ec393434a
SHA2566cb24ba70a1878bed9619e1d200b1dad2ab7eb5775f9b3acf82e1e3b8d3914c8
SHA5128160faebb5191d0bfae0805b56770903247062815889de8d55f6d9f17d77226d0d211e847a318244bc0f1320f14fc243811dca8a258ffd6b13bc0ec3ef2bcf8c
-
Filesize
257KB
MD512846e97ffae23a0cc5fe46c0daa7b86
SHA14fffbd5dee8a3875a7bb61a5faa6155ec393434a
SHA2566cb24ba70a1878bed9619e1d200b1dad2ab7eb5775f9b3acf82e1e3b8d3914c8
SHA5128160faebb5191d0bfae0805b56770903247062815889de8d55f6d9f17d77226d0d211e847a318244bc0f1320f14fc243811dca8a258ffd6b13bc0ec3ef2bcf8c