Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe
Resource
win10v2004-20241007-en
General
-
Target
d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe
-
Size
539KB
-
MD5
2d069d14993aa9cb891c27da35e760ae
-
SHA1
801e998321101618e7f376e26f11cc24bb4177f5
-
SHA256
d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270
-
SHA512
e970d059ae47a60e07c1bc529072d00952d5dde066083aa4cac824bd2d16db7ebf59c45f96146a53730a96da5ead6b04c60fc3496279237b1f687886b7d03bd3
-
SSDEEP
12288:zMrXy90pSO/i0fV0IwRG3Mcf029OBoKFtyhqNtPD6QyKpdHcIQS3:0y2Sai0fPqG80UGKhP+QLYM
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3300-19-0x0000000004BF0000-0x0000000004C36000-memory.dmp family_redline behavioral1/memory/3300-21-0x0000000005250000-0x0000000005294000-memory.dmp family_redline behavioral1/memory/3300-25-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-37-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-85-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-83-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-79-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-77-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-75-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-73-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-71-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-69-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-67-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-63-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-61-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-59-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-57-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-55-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-53-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-51-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-49-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-47-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-43-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-41-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-39-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-35-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-33-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-31-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-29-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-27-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-81-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-65-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-45-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-23-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3300-22-0x0000000005250000-0x000000000528E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2224 vAg51.exe 3300 dya68.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vAg51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vAg51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dya68.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3300 dya68.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2224 1572 d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe 83 PID 1572 wrote to memory of 2224 1572 d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe 83 PID 1572 wrote to memory of 2224 1572 d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe 83 PID 2224 wrote to memory of 3300 2224 vAg51.exe 84 PID 2224 wrote to memory of 3300 2224 vAg51.exe 84 PID 2224 wrote to memory of 3300 2224 vAg51.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe"C:\Users\Admin\AppData\Local\Temp\d3013d5aa1afff5f38f204173aa7fb5b34820865f8f41c911557521fc9ca8270.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAg51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAg51.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dya68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dya68.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD54567595e94e1576c25d43cb8b7cf11ef
SHA1846439e2458073b73567988bcb33985e0bee3d57
SHA256ccc2e59452df8e7d337f1f784dd77410611e7c9589b3b032083153337461c4b7
SHA51248ede7e4abc4d22268f76310d51cd76a6dbc761852be3126492191349763319f905ff108ae6ce709f98cc0dbbe991d09058f11e5efb049d133dcb07a060850fe
-
Filesize
305KB
MD5a97676767e51104d57e1d0ad956e4274
SHA1518c54685f9d461424f96247c32d1d9db20fea32
SHA256c5ab3172fb7e5ced3b6d009742e00e48698714a2c54f887eb80d15c12b8a6558
SHA5120fad6360d1ac0f729181738ee02fa242ff925de13f64deea9bd0af4b2ee1e1891dfa952698fa1d8318e468c4a30908ef33ad592fb675d0521f5296828aafb87d