Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe
Resource
win10v2004-20241007-en
General
-
Target
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe
-
Size
760KB
-
MD5
57f6231b519552d31b66c55faf263053
-
SHA1
20be74bdea71d56de0595e93ab6e870ca8aff2d6
-
SHA256
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d
-
SHA512
ef495d39607376295d71b52b7a70b155ec1d1fa6dc4d54638293a9b4d0381cc99cc02964321b7c9cafd1b7e197c41e48c101e089dd73981401dfc75fc7432a2c
-
SSDEEP
12288:uMrfy90JINSKI44cT7jVn1+aLznZe4KBQ9IAymn8wDYevZ43V9MZR6XnES:ByXW4tDV1ZZCBQ9IAymFDDvZq3MZRInL
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1948-22-0x0000000002840000-0x0000000002886000-memory.dmp family_redline behavioral1/memory/1948-24-0x0000000004EE0000-0x0000000004F24000-memory.dmp family_redline behavioral1/memory/1948-48-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-70-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-88-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-86-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-84-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-82-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-80-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-76-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-74-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-72-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-68-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-66-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-64-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-62-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-60-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-58-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-56-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-54-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-52-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-50-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-46-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-44-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-42-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-34-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-32-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-30-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-28-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-78-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-26-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-25-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-40-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-38-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/1948-36-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4848 vov79.exe 2816 vML22.exe 1948 djP62.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vov79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vML22.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vov79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vML22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djP62.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1948 djP62.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4600 wrote to memory of 4848 4600 dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe 84 PID 4600 wrote to memory of 4848 4600 dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe 84 PID 4600 wrote to memory of 4848 4600 dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe 84 PID 4848 wrote to memory of 2816 4848 vov79.exe 86 PID 4848 wrote to memory of 2816 4848 vov79.exe 86 PID 4848 wrote to memory of 2816 4848 vov79.exe 86 PID 2816 wrote to memory of 1948 2816 vML22.exe 87 PID 2816 wrote to memory of 1948 2816 vML22.exe 87 PID 2816 wrote to memory of 1948 2816 vML22.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe"C:\Users\Admin\AppData\Local\Temp\dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vov79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vov79.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vML22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vML22.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\djP62.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\djP62.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD546624cfd82321246a507118b1ba98580
SHA164f57234cb787763f27f6889a473bd00f84580ec
SHA2564c02aa83b749783b354d061f170e83ceaf41ac879439d58acd98448207536a3b
SHA512388bd8c2c922cce943235c9a00a07815bd30c8e6890bbb7bc193acc2d25f79ef61fd8b991fe795e62f1aa66a18eaac593544b9262fae95aeb2c93bc6db3382f6
-
Filesize
511KB
MD54c3b7f542f8b4e0b93cb95082c42f0c1
SHA10f1a67c56bdb8b1b9307a87c1f0272b495cf270f
SHA2565d19b4a8de7f39a898b6c82e40d68b0b0cbe93e0de7ebe9ab7ba9ddd114d7b83
SHA51245c8223f9669b3b13516f9afc805247869523032d78967069adf858d2da0170832e2419578baa69cd3aeceb1752f8a931cfa5e2809453b0246bc0396b8f45f7d
-
Filesize
287KB
MD5d8188b6e91a330ef924426abe7f1f9f8
SHA1980dad68e6d92724d8f3762ee094943390ed444a
SHA256b45b88fca18a6ca918d989de54ef418f9c4bc147df9c88f7d10fe8b85962f227
SHA51271e78e3d5ea8c1607c508ba8baa40ee66776530c452fd73e7fdbe30c6d0a738d28f9ddfb5f6cd8d6c8a9eabb3ebe9aa4aef269779b3b77cd908911e3ddcfb5b4