Resubmissions
23-11-2024 19:36
241123-ybkpeasndx 1013-07-2024 16:26
240713-txqqbsybmj 313-07-2024 15:27
240713-sv4czawfkl 308-04-2024 13:45
240408-q2dpsaae25 1021-11-2023 22:21
231121-196ewagh72 1021-11-2023 22:20
231121-183ycshf5y 1021-11-2023 22:06
231121-1z2c6sgh38 1027-08-2023 18:38
230827-w98ssaee5z 1001-06-2023 22:35
230601-2h4yeagg74 1021-04-2023 17:56
230421-whz2kahb76 10Analysis
-
max time kernel
1798s -
max time network
1805s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 22:06
Static task
static1
Behavioral task
behavioral1
Sample
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
Resource
win10v2004-20231023-en
General
-
Target
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
-
Size
1.2MB
-
MD5
5b3b6822964b4151c6200ecd89722a86
-
SHA1
ce7a11dae532b2ade1c96619bbdc8a8325582049
-
SHA256
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34
-
SHA512
2f0d99af35c326cf46810c7421325deb55ae7ca36a8edc2716a3d32d9e6769e0d374581a98912e22fceeb6973e972463ed8b2fa4d4399043c443fa100dfd17b0
-
SSDEEP
24576:5yY4YriuQJ5X4SuIcmuBLahxwUzN1YyqoVKucvTNLF9:sY4FuIahGxRMoobNLF
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000022cea-33.dat healer behavioral1/files/0x0007000000022cea-34.dat healer behavioral1/memory/4824-35-0x0000000000E80000-0x0000000000E8A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iwN36Rn.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3608-48-0x00000000026F0000-0x0000000002736000-memory.dmp family_redline behavioral1/memory/3608-51-0x0000000002770000-0x00000000027B4000-memory.dmp family_redline behavioral1/memory/3608-52-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-53-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-55-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-57-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-59-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-61-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-63-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-65-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-67-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-69-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-71-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-73-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-75-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-77-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-79-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-81-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-83-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-85-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-87-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-89-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-91-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-93-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-95-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-97-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-99-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-101-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-103-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-105-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-107-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-109-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-111-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-113-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/3608-115-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4084 sbO31En07.exe 864 smS09II74.exe 1504 slc39Ad82.exe 3068 sko86jV13.exe 4824 iwN36Rn.exe 3608 kLG98Ei.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iwN36Rn.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sbO31En07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" smS09II74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" slc39Ad82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" sko86jV13.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4824 iwN36Rn.exe 4824 iwN36Rn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4824 iwN36Rn.exe Token: SeDebugPrivilege 3608 kLG98Ei.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4084 2868 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe 88 PID 2868 wrote to memory of 4084 2868 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe 88 PID 2868 wrote to memory of 4084 2868 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe 88 PID 4084 wrote to memory of 864 4084 sbO31En07.exe 90 PID 4084 wrote to memory of 864 4084 sbO31En07.exe 90 PID 4084 wrote to memory of 864 4084 sbO31En07.exe 90 PID 864 wrote to memory of 1504 864 smS09II74.exe 91 PID 864 wrote to memory of 1504 864 smS09II74.exe 91 PID 864 wrote to memory of 1504 864 smS09II74.exe 91 PID 1504 wrote to memory of 3068 1504 slc39Ad82.exe 92 PID 1504 wrote to memory of 3068 1504 slc39Ad82.exe 92 PID 1504 wrote to memory of 3068 1504 slc39Ad82.exe 92 PID 3068 wrote to memory of 4824 3068 sko86jV13.exe 93 PID 3068 wrote to memory of 4824 3068 sko86jV13.exe 93 PID 3068 wrote to memory of 3608 3068 sko86jV13.exe 104 PID 3068 wrote to memory of 3608 3068 sko86jV13.exe 104 PID 3068 wrote to memory of 3608 3068 sko86jV13.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
Filesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
Filesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
Filesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
Filesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
Filesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
Filesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
Filesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
Filesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
Filesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44