Overview
overview
10Static
static
30b4bb67302...ca.exe
windows10-2004-x64
910f472a1b5...37.exe
windows10-2004-x64
101208df4133...ab.exe
windows10-2004-x64
1022c8884d0e...34.exe
windows10-2004-x64
10277f52adcf...94.exe
windows10-2004-x64
103a484bb7d4...29.exe
windows10-2004-x64
103bdb06aad8...f3.exe
windows7-x64
103bdb06aad8...f3.exe
windows10-2004-x64
103d03f2fde9...00.exe
windows10-2004-x64
1040fbde6d35...71.exe
windows10-2004-x64
1053b6f1fa7f...02.exe
windows7-x64
1053b6f1fa7f...02.exe
windows10-2004-x64
106286d393c9...52.exe
windows7-x64
36286d393c9...52.exe
windows10-2004-x64
1066b71ef5ba...21.exe
windows10-2004-x64
107c73d83c0a...75.exe
windows10-2004-x64
10bccb41d4cd...17.exe
windows10-2004-x64
10c1c526ed2a...52.exe
windows10-2004-x64
10c726b1e0ec...ab.exe
windows10-2004-x64
10c8c3182273...54.exe
windows10-2004-x64
10d1e8dbd667...dd.exe
windows10-2004-x64
10d4fbce6f6a...86.exe
windows7-x64
3d4fbce6f6a...86.exe
windows10-2004-x64
10d7873c75af...a3.exe
windows10-2004-x64
10e25842dbe6...9e.exe
windows10-2004-x64
10fa1fbbcbd6...cf.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 15:27
Static task
static1
Behavioral task
behavioral1
Sample
0b4bb67302386646ed679bf7dbfd9e44d9c5eb985f2c043ef415113edb2b2eca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
10f472a1b5799a09ae60fd901a10125c8eed6220bdbed49cfa301962e7972837.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1208df413315575653953f79f71da4afa0f3816339cca881a3bd12be0cc7f0ab.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
22c8884d0e33db7ed2cd497936f31b5efeaa43a037af2f4c61a1a768919a6334.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
277f52adcffdae3b95ac4c1b928de6c4a507600023471054f5c9d34f3b852f94.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
3a484bb7d4882d8f4ab5dcb7c60a4d1397a642611888b68c5e13702926794729.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
3bdb06aad8f213ba8c98a80c76648a19cb074038ed82c6e1c890c4181bbd59f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
3bdb06aad8f213ba8c98a80c76648a19cb074038ed82c6e1c890c4181bbd59f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
3d03f2fde9b9bf8b3069d0b3bdf2625973d4f23daa92673be4185d9c0d5f2500.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
40fbde6d35302d77db924d8a4db6569c23336d9205e82f12a82228cc100edb71.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
53b6f1fa7f2466210d99ea5bba427014f08b5656339d05d1dc0d120b7c6a3b02.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
53b6f1fa7f2466210d99ea5bba427014f08b5656339d05d1dc0d120b7c6a3b02.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6286d393c93044fd5b8363ccad5324fadfde3e3d9b340ec908941eab3fe90652.exe
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
6286d393c93044fd5b8363ccad5324fadfde3e3d9b340ec908941eab3fe90652.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
66b71ef5ba881cda863dc50bab8ede20c8bdff7c699aa7b767f476f2b83eb421.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
7c73d83c0a0062c5cead0597dac9f90beac93ae125536330571cadd52acefe75.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
bccb41d4cd07f22dc7128aa361e7b2b43320ef072e11627fd143b376cdee0817.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
c1c526ed2ab259f0f169f9f6ea8e5765aeff3889749ee6e4c140d24a06cd2f52.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
c726b1e0ec6fea88dec580a790bb738a4976fe2f076a838067ec66bc403054ab.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
c8c3182273e1f34a2e9b4a2afb39aa5e5fa9ae93368dd9487b95f7ca43f17d54.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
d4fbce6f6a714d781d28b578580461d8811477b0156700a58b25cdce361c4186.exe
Resource
win7-20240508-en
Behavioral task
behavioral23
Sample
d4fbce6f6a714d781d28b578580461d8811477b0156700a58b25cdce361c4186.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
d7873c75af8bf0f44eedb5171fcab5b70d157578f4a43aff8aaadb23058cb1a3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
e25842dbe6ab8469f81bd821ab70c2818962c7a681f45dfcd09f741409b2bb9e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
fa1fbbcbd6fb540be61aeb0eb89533d4e8d0fb64c2d0bcdd3f9263ff954a2acf.exe
Resource
win10v2004-20240508-en
General
-
Target
d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe
-
Size
307KB
-
MD5
be44ddb40e085d64a8405eb231963d84
-
SHA1
089450ca5957daa8a8a3a346c6e497000c25e5cc
-
SHA256
d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd
-
SHA512
aedd56e83d7927b377ff827536ef601ef40b119ac3eef701b91d02d8ef2f11df222469a08064121118413e161ae5fef8060bc71df7c5675583ac5f8e3bad3c63
-
SSDEEP
6144:KNy+bnr+op0yN90QEwwSAl5E1S3+/9+S/k0KB5Njk:HMrUy90JrwS2ZKbu
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral21/files/0x0007000000023430-5.dat family_redline behavioral21/memory/2056-8-0x00000000006B0000-0x00000000006E0000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
pid Process 2056 g1920462.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3272 wrote to memory of 2056 3272 d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe 82 PID 3272 wrote to memory of 2056 3272 d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe 82 PID 3272 wrote to memory of 2056 3272 d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe"C:\Users\Admin\AppData\Local\Temp\d1e8dbd66731cd0a95e444d0fda9ebdc32fdc49845c43907cd292619ac4e88dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g1920462.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g1920462.exe2⤵
- Executes dropped EXE
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a2c9c17afefa6bf916c24bbd4f495a6f
SHA147e6ae11989fc1f04d20984d5e9fb5f3b9a1a6dc
SHA256c2983fb6cd3f07ea3641e57cf51ef8ecc219415818831b4afd88e7224332578a
SHA5121a64cbf7435e78424e68fb832ba36d935ba717af69ccba456d7a829ce3036879acd2b8e3e770235e99ccd333cc4b0336c213cab01751bbe1309d46c7d3ff01f1