Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe
Resource
win10v2004-20241007-en
General
-
Target
27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe
-
Size
539KB
-
MD5
769fc5c0048329d9658539f21aaef663
-
SHA1
315578fe18b240c903e96549d7483c891e959c45
-
SHA256
27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944
-
SHA512
a7c02b034e34f528e19aea66a496a471fad4c9f57f45a27fb295545a85590a31af19b5063974e04fe70652dcbd3a96968eaa0013e930e032981a577448120bfb
-
SSDEEP
12288:bMrny90BmkZgQAJOBoKFqNhqNtPD6QyopnHcIQQKZ:0yNkZgQpGKVP+QXYQKZ
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2764-19-0x0000000002390000-0x00000000023D6000-memory.dmp family_redline behavioral1/memory/2764-21-0x0000000002670000-0x00000000026B4000-memory.dmp family_redline behavioral1/memory/2764-75-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-85-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-83-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-81-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-80-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-77-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-73-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-71-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-69-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-67-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-65-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-61-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-59-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-58-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-55-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-53-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-51-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-49-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-47-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-43-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-41-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-37-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-35-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-33-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-31-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-29-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-27-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-25-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-23-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-22-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-63-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-45-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/2764-39-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4124 vRX40.exe 2764 dML09.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vRX40.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vRX40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dML09.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 dML09.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4124 5064 27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe 83 PID 5064 wrote to memory of 4124 5064 27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe 83 PID 5064 wrote to memory of 4124 5064 27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe 83 PID 4124 wrote to memory of 2764 4124 vRX40.exe 84 PID 4124 wrote to memory of 2764 4124 vRX40.exe 84 PID 4124 wrote to memory of 2764 4124 vRX40.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe"C:\Users\Admin\AppData\Local\Temp\27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRX40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRX40.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dML09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dML09.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD5025e584798ae60c3461e43baec025ef5
SHA1d95a885de9a9e0b0cdc48f113e4fe52a7aa47160
SHA2569bc32623b541497b19257505b69de0438b3545835229b204c0b5aec7e5ebfed2
SHA51290c1b873a65e340a262abc33074f29f02eadcf3ac2ca1036a720a99bda8414cd981553279f219bd2348f5c15fcd3ca42af0503c98d372b41007a1338b2a53e17
-
Filesize
305KB
MD5a97676767e51104d57e1d0ad956e4274
SHA1518c54685f9d461424f96247c32d1d9db20fea32
SHA256c5ab3172fb7e5ced3b6d009742e00e48698714a2c54f887eb80d15c12b8a6558
SHA5120fad6360d1ac0f729181738ee02fa242ff925de13f64deea9bd0af4b2ee1e1891dfa952698fa1d8318e468c4a30908ef33ad592fb675d0521f5296828aafb87d