Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe
Resource
win10v2004-20241007-en
General
-
Target
9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe
-
Size
539KB
-
MD5
15d5bfe553b042af11539a6469367ebf
-
SHA1
bd511e83d2ba955db2b9a9038467072f9660594b
-
SHA256
9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c
-
SHA512
c19091cff1581ffc0b5afaa79920be92ac51a6578ab4699e1b4a45fd35cd199da6193190471eca03448904f867e1a4a5f14f459fd495fdf2613a1a18dbacc6f4
-
SSDEEP
12288:QMrDy901AmU0pem51QbcnlatVz0ztFuZ6gI0G3g9AMLRHK+ly:DymAmUtbcYDghG6gTpR6
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3756-19-0x0000000002570000-0x00000000025B6000-memory.dmp family_redline behavioral1/memory/3756-21-0x0000000002730000-0x0000000002774000-memory.dmp family_redline behavioral1/memory/3756-83-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-77-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-61-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-53-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-35-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-23-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-22-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-85-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-81-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-79-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-75-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-73-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-71-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-69-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-67-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-65-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-63-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-59-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-57-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-55-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-51-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-49-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-48-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-45-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-43-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-41-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-39-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-37-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-33-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-32-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-29-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-27-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3756-25-0x0000000002730000-0x000000000276E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4296 veO62.exe 3756 dMo81.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" veO62.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dMo81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veO62.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3756 dMo81.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1716 wrote to memory of 4296 1716 9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe 83 PID 1716 wrote to memory of 4296 1716 9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe 83 PID 1716 wrote to memory of 4296 1716 9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe 83 PID 4296 wrote to memory of 3756 4296 veO62.exe 84 PID 4296 wrote to memory of 3756 4296 veO62.exe 84 PID 4296 wrote to memory of 3756 4296 veO62.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe"C:\Users\Admin\AppData\Local\Temp\9232fb2bbf69dcb46187f911d425619ff3013fac180bf6036523200b2c894f0c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\veO62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\veO62.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMo81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMo81.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD51dcd880269e9c34fd39d5ebc8854ca16
SHA1658b5c4d22ce2021b8a723f4a817383994733a51
SHA256682ca38c929a1bbd32741e3606644743b53a4efdd3a7608a75104ae1c5c1f52d
SHA512f781385b14022d08147b21a0bae917fdf35257a42ab462f7bb94a1db224eb80281568cf5c350d94b688687ff7ed03021f3b1546b1004fcc3d0ef98a1237c3b53
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f