Overview
overview
10Static
static
30d301494f1...b9.exe
windows10-2004-x64
1017123cde24...76.exe
windows10-2004-x64
103513e5a1be...0b.exe
windows10-2004-x64
103548eb3ee0...c3.exe
windows10-2004-x64
1037bb007e1a...b5.exe
windows10-2004-x64
103b8019115c...d8.exe
windows10-2004-x64
103ba16fdd2a...8a.exe
windows10-2004-x64
103c47d4d72a...e8.exe
windows10-2004-x64
105598d9028e...fd.exe
windows7-x64
105598d9028e...fd.exe
windows10-2004-x64
105d95f47641...f4.exe
windows10-2004-x64
1061d857a524...a5.exe
windows10-2004-x64
1064f004d4a2...36.exe
windows10-2004-x64
107787b07a17...49.exe
windows10-2004-x64
107cc3996906...7e.exe
windows10-2004-x64
10825d0619a8...ce.exe
windows10-2004-x64
109e6f3fd3f7...c2.exe
windows10-2004-x64
10a49c96afc3...92.exe
windows10-2004-x64
10e2945d600c...9e.exe
windows10-2004-x64
10eb8cedd00b...3b.exe
windows10-2004-x64
10f9bdee7f3d...5b.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
17123cde248bf04440dd66e0818e707111a27baaf0a0f8b46803653840d0f776.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
3513e5a1bef31ae0f1858b98a4a405bb6b73e0c22654ea595cfe351e68560d0b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3548eb3ee082140f111579d722d1924acef2c914601158aa407cc48e37e04dc3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
37bb007e1a7b802fb160d31d43e6ee29920fb53b1d37beda1c042d893778cab5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
3b8019115c4ceca7cbcfddbb6bbe680cac9c8811275a16616d40ff294ceb6ed8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
3ba16fdd2a3366af19641ad21ef4ff828edfd310b6fd8c6b4e24aa854d8a668a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3c47d4d72a38e9bc6761e47d9e0e51429f2c67ffdd939c07a664efe29c9cd5e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
5598d9028e8f5dbcce57fc5044a12a3e254972b90687bd0e2d8e20298065c3fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
5598d9028e8f5dbcce57fc5044a12a3e254972b90687bd0e2d8e20298065c3fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5d95f476419d3a3135715f2eed0aa6de69b130436772d29100fd7870a2c450f4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
61d857a52459b5cf9779c58c6ee28d8e2760da3fe873785eb0afcffa6b0680a5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7787b07a1719f5524402ec7cf71fb92a7177ee85b0a424e2b97f619ba2b32e49.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
7cc399690625fe51c1b469f7e049782a493baa3a1ef701d932c57888bd5d237e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
825d0619a846701eef20b8c0a10ac730a81fefda0f8afdbe06a54bd4251541ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
9e6f3fd3f785137a445cbe56ff06c292a6df24180f53811fc86132a2bd4859c2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
a49c96afc3e1c86dfaa9e2002f5ce95dbdee44cf71bf78474eaa2ab199a57f92.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e2945d600c8d0d3d77a8528637dcb944f9c51be150c7dd4e619a249b7b9a309e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
eb8cedd00b7ab240f275eb4069c500fbebe244ecae84cca8f1700815583b7f3b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
f9bdee7f3daff1675551aa7b8f0eba683dba4df9a9998cc5de0b9da0a577135b.exe
Resource
win10v2004-20240508-en
General
-
Target
64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe
-
Size
271KB
-
MD5
4ad462c2955d05dcddb69f4ca8d8b504
-
SHA1
fce5d821b79e9c448664c694e12661d73819e46a
-
SHA256
64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36
-
SHA512
fc96ff0c391a66600703ef957ca9d1a9e4b126b3a001e12e8c9f40ae363a5a8c473899ed8a929edb9268e23aa342284d80abeab64b3340ac3b655943331d3624
-
SSDEEP
6144:Kwy+bnr+rp0yN90QEyd3Y9nR/kYbFXoUzciEQtRv8:UMrPy90Ido9nR5F/zcStRv8
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral13/files/0x0008000000023435-5.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral13/files/0x0007000000023436-8.dat family_redline behavioral13/memory/1940-11-0x0000000000770000-0x00000000007A0000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 1184 m5269619.exe 1940 n6761123.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4056 wrote to memory of 1184 4056 64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe 82 PID 4056 wrote to memory of 1184 4056 64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe 82 PID 4056 wrote to memory of 1184 4056 64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe 82 PID 4056 wrote to memory of 1940 4056 64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe 83 PID 4056 wrote to memory of 1940 4056 64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe 83 PID 4056 wrote to memory of 1940 4056 64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe"C:\Users\Admin\AppData\Local\Temp\64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5269619.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5269619.exe2⤵
- Executes dropped EXE
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6761123.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6761123.exe2⤵
- Executes dropped EXE
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD55ec4db0dd00a578ff42c721f4af96543
SHA1050d32ef5ec09bf8849edc51d9357d676c5e84e2
SHA2569a6dcac78ec279de8aab5445fdab7fd80d2d96f5bf458860be17174798aedca0
SHA512accb8dc3bc5bbd95d78a1857d7087e7e8001fe53395904dcc896456f01c5d78b3ec53e051ca4d595681bfecd9eb846568b39b47218d6008940e6871da028a3ff
-
Filesize
174KB
MD5e786f7b019bb0b14ecf6ce028af0dafc
SHA1a817380b0dcdcd396fb53b92f85a599254de2df5
SHA256c4d3477c71d1e86b5cab3bfacc65937b102cf138d90e6d213bf1823e099e9bb0
SHA5122e26c31517e0d6a13e92f55fb116db6c6e9ebb4afa48d4590a815264c99557cf30718b016e2a88590e13d8af672adf815f7886cded33073d05846c96963bcedd