Overview
overview
10Static
static
10012700a410...85.exe
windows10-2004-x64
1002a23f59da...1f.exe
windows10-2004-x64
10053ddd7019...99.exe
windows10-2004-x64
10072f59f857...a5.exe
windows7-x64
1072f59f857...a5.exe
windows10-2004-x64
107b9d54ca0...2c.exe
windows10-2004-x64
10085092942b...7b.elf
ubuntu-18.04-amd64
085092942b...7b.elf
debian-9-armhf
085092942b...7b.elf
debian-9-mips
085092942b...7b.elf
debian-9-mipsel
08cbd1cc0c...d1.elf
debian-12-armhf
10a50e4e96f...61.exe
windows7-x64
100a50e4e96f...61.exe
windows10-2004-x64
100bdd1bc4a2...54.elf
debian-12-armhf
10c349ec65f...e3.exe
windows10-2004-x64
100c6a7849d4...d3.exe
windows10-2004-x64
100ceb0dadfa...de.elf
debian-9-mips
0dd32a3e7e...85.exe
windows7-x64
100dd32a3e7e...85.exe
windows10-2004-x64
100dd3f8b254...7f.exe
windows10-2004-x64
101100f4a753...15.exe
windows10-2004-x64
10124c02ed92...f5.exe
windows7-x64
10124c02ed92...f5.exe
windows10-2004-x64
101267a2b9b9...dc.exe
windows7-x64
101267a2b9b9...dc.exe
windows10-2004-x64
1013a5b3d41f...f1.exe
windows7-x64
1013a5b3d41f...f1.exe
windows10-2004-x64
1013a63fbb66...62.exe
windows10-2004-x64
10143dea0e6e...5c.exe
windows10-2004-x64
1014779e087a...9a.elf
ubuntu-24.04-amd64
115f6ddf672...e3.exe
windows10-2004-x64
1016478becee...e4.elf
debian-12-armhf
Analysis
-
max time kernel
137s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
012700a41078e9d01c70955c50073da3b9b9a163c6fa5776195c278a70bf8c85.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
053ddd70199526b974c71bb268539790e27247760bbf2680be1e0e82d01fb799.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
072f59f857e5b792013df1c7916d31ad467fa3dab84c623a44e62ce35f13a3a5.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
072f59f857e5b792013df1c7916d31ad467fa3dab84c623a44e62ce35f13a3a5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
07b9d54ca0b731b8a0a8aaa99c2204278d655de9f349d485cd084b2709f0062c.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
085092942b0623e53eceee98070267fb4f8d6b1f6c866d75389be1868784dd7b.elf
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
085092942b0623e53eceee98070267fb4f8d6b1f6c866d75389be1868784dd7b.elf
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
085092942b0623e53eceee98070267fb4f8d6b1f6c866d75389be1868784dd7b.elf
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral10
Sample
085092942b0623e53eceee98070267fb4f8d6b1f6c866d75389be1868784dd7b.elf
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
08cbd1cc0c473b44845d3960e6af301cb430002f301a55d40dbd03477ad85ed1.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral12
Sample
0a50e4e96fe3948c570214cd5dcdf34b3a2625742eaf15ebdde41d0cd75dea61.exe
Resource
win7-20240611-en
Behavioral task
behavioral13
Sample
0a50e4e96fe3948c570214cd5dcdf34b3a2625742eaf15ebdde41d0cd75dea61.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
0bdd1bc4a24d817604fadd739b1e80cf47722df37c4b2240f6ddfb3c2d120454.elf
Resource
debian12-armhf-20240418-en
Behavioral task
behavioral15
Sample
0c349ec65fde9efebd2ff123c6b223cce44c6fdbafa19b46c12d43eccde3a3e3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
0c6a7849d41395e38b5f348c64219356456952602e96e3228379a31e3031a0d3.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
0ceb0dadfa894aba36d3629ef69c69540f0cba4fe5d52f7fb0b9663738923bde.elf
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral18
Sample
0dd32a3e7e27a6cc87ab60dc8a1117956b6eb07a455c2996a43edf71cfa64b85.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
0dd32a3e7e27a6cc87ab60dc8a1117956b6eb07a455c2996a43edf71cfa64b85.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
0dd3f8b25459c4e5e8eabfe91f24381813035cf7c71837ccb6e5f6899e48c27f.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
1100f4a7535cf8075a78a8da90894ef23cade6fed0d169d44c1738a870630c15.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral22
Sample
124c02ed924e11b06b74e1b8c1290adbb1e50dfa2a7bcf95104c6425a1f82ef5.exe
Resource
win7-20240611-en
Behavioral task
behavioral23
Sample
124c02ed924e11b06b74e1b8c1290adbb1e50dfa2a7bcf95104c6425a1f82ef5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
1267a2b9b9ff99e4039372e8ee87b8d61ad0a4db0ee052564aee4ddccf2de9dc.exe
Resource
win7-20240508-en
Behavioral task
behavioral25
Sample
1267a2b9b9ff99e4039372e8ee87b8d61ad0a4db0ee052564aee4ddccf2de9dc.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral26
Sample
13a5b3d41f084cd25b4142b948e31e80a917c91fff12aa8b156ac9f23c18b0f1.exe
Resource
win7-20240508-en
Behavioral task
behavioral27
Sample
13a5b3d41f084cd25b4142b948e31e80a917c91fff12aa8b156ac9f23c18b0f1.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral28
Sample
13a63fbb669551bf49f493a5471f08d73b453f35ebeafae1384e9f34dff94462.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
143dea0e6ec39e956087e8ed61f409995090455ba38a1e73225a6d87b9d1a55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
14779e087a764063d260cafa5c2b93d7ed5e0d19783eeaea6abb12d17561949a.elf
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral31
Sample
15f6ddf672086fbd9e4f59fa670c201e101a75e13a71645c982db165fc6e66e3.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral32
Sample
16478beceea6d01555ceffc1c582531617a76919cc713c3b72319c19a879b6e4.elf
Resource
debian12-armhf-20240418-en
General
-
Target
02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe
-
Size
726KB
-
MD5
603947b90bbf3dc52aa799d6d74ecc3f
-
SHA1
3af5d58a9da2971fdbe0097712d19051cf0eae81
-
SHA256
02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f
-
SHA512
ead2ec945c1853cacde72d20182cdb5d282e74b6a236d4cbd191faffb68e30f3a5afab117ae3fc73a1ef8ebb8d392eee07a18143f0b52240c4ea9433f6f3df31
-
SSDEEP
12288:nMrty908YkYKWr3HLkkKPYPGjBbrY6t34+ZOLtQ48ErdVhR0X+5:6yakYHHfKwqY694+Zct3lXD4M
Malware Config
Extracted
redline
duza
83.97.73.129:19071
-
auth_value
787a4e3bbc78fd525526de1098cb0621
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3972-28-0x0000000000460000-0x000000000046A000-memory.dmp healer behavioral2/files/0x00070000000234ec-35.dat healer behavioral2/memory/1672-37-0x00000000001B0000-0x00000000001BA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection j7404106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" j7404106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" j7404106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9327528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9327528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9327528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9327528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9327528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" j7404106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" j7404106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" j7404106.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k9327528.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000234e9-40.dat family_redline behavioral2/memory/1668-42-0x00000000000B0000-0x00000000000E0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 5100 y3662660.exe 4636 y0062469.exe 1248 y9151891.exe 3972 j7404106.exe 1672 k9327528.exe 1668 l3382483.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features j7404106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" j7404106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k9327528.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3662660.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0062469.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y9151891.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3972 j7404106.exe 3972 j7404106.exe 1672 k9327528.exe 1672 k9327528.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3972 j7404106.exe Token: SeDebugPrivilege 1672 k9327528.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5036 wrote to memory of 5100 5036 02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe 80 PID 5036 wrote to memory of 5100 5036 02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe 80 PID 5036 wrote to memory of 5100 5036 02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe 80 PID 5100 wrote to memory of 4636 5100 y3662660.exe 81 PID 5100 wrote to memory of 4636 5100 y3662660.exe 81 PID 5100 wrote to memory of 4636 5100 y3662660.exe 81 PID 4636 wrote to memory of 1248 4636 y0062469.exe 82 PID 4636 wrote to memory of 1248 4636 y0062469.exe 82 PID 4636 wrote to memory of 1248 4636 y0062469.exe 82 PID 1248 wrote to memory of 3972 1248 y9151891.exe 83 PID 1248 wrote to memory of 3972 1248 y9151891.exe 83 PID 1248 wrote to memory of 3972 1248 y9151891.exe 83 PID 1248 wrote to memory of 1672 1248 y9151891.exe 85 PID 1248 wrote to memory of 1672 1248 y9151891.exe 85 PID 4636 wrote to memory of 1668 4636 y0062469.exe 86 PID 4636 wrote to memory of 1668 4636 y0062469.exe 86 PID 4636 wrote to memory of 1668 4636 y0062469.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe"C:\Users\Admin\AppData\Local\Temp\02a23f59da1c37d7ed4e0f14e61fa5b264083dc4bdf35a1b09f0a3d29293981f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3662660.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3662660.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0062469.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0062469.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9151891.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9151891.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j7404106.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j7404106.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k9327528.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k9327528.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3382483.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3382483.exe4⤵
- Executes dropped EXE
PID:1668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD56289824a1644a295ca95c7618dfc2d57
SHA199dcc49a413a1cd103f3b84d63893f5693274f8a
SHA256e4cdc42e8afc467142a629153fcfccf450227e6b3705d1c27bf779197ef1f546
SHA512b15bb7263b9d05f326b7e42e6e7cc518b098614a94918aa25693747176801c0d983139b21e6214192bbd99b01fe483deb55d12255d0f48e6b838ed7b48faa700
-
Filesize
354KB
MD5caf9369f954917ec47ca66553998f145
SHA182f19fa39e630efce6562a44b74c332338f5c12f
SHA256fe80270bc8981afb506e4aeb7781fbdb90b137c6ea7ec728f793413a4ecb2837
SHA51288bddd3273f2d3b873f1414afdc4e21c1b8664cf2248e219e937e22ecb4a9309a2984406910ade9847a77bdd768636b9c0ac5cd7f46621b387241efeb7bd1f7e
-
Filesize
172KB
MD5271700b19d450d6ec7df159584d5afdf
SHA152f6143c0f0f92c58757ab92af3401c19a8fe91a
SHA2564dd3ce52ec8a76830130c2fff28eccddb6091417f50126ede4b36371525b4ba5
SHA512aced014acce41469c11c1ba14f0faa6ccc53cb03cd045dd0944eb55b528967ae7870ecd163bff2bf7a52c58b861edec186390fcacb647048c43e7e60d2f22779
-
Filesize
199KB
MD5b536677bdd86084d557d956c8a1f9e82
SHA16be501a406dca1cade61a126ace78800895b14ba
SHA256a76a9bb01ee56d41b16aa1454920546376f3d59152e25f0e2c58fe6744dcd7a6
SHA5127d18a8abfe7570b3313e030f990650e6203dafbb9de18e3e75e2634f2a9c952a8be56a5739f767032e924bbe0b5643fcd092c4cfad2654e5b8e3925556fbbaf6
-
Filesize
102KB
MD5d4f4ac636a8e6b2d06da0e5b2ae19ad4
SHA1f468bca795e587529c49d31dcfe657b97da7b44b
SHA256c110ec903537181eca058ba0e1b702c084c4d5c6920d2edfcadbc7a314c32add
SHA512cef572a202012404013cc725b32c4f888c0ea786cb4c1be1f5b401e5ba1d078d318e75092d83960b71c23891a7832717f85d9f5bbecdb55ba9a93751684d9c72
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91