Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe
Resource
win10v2004-20241007-en
General
-
Target
2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe
-
Size
739KB
-
MD5
15d5e3180cdd4ecd84fb126c22842382
-
SHA1
b24d584f33be42b9ec909c84da5722ffa9e2f82f
-
SHA256
2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30
-
SHA512
e6bd03d60c9a9df23b6af1313972f8094f41fcfdb87633a725e450ea79eb6ac72b60ee966414215361d34bf804b879de1671c473a34621c02f69e6b505be58a5
-
SSDEEP
12288:VMrNy902AC4CiE7uYBco+AeGdtolfQxOEU87IuqQ0mvh0L2u8T:4yV7uPVhlfQxOEL8u1vM2uW
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2696-22-0x00000000029C0000-0x0000000002A06000-memory.dmp family_redline behavioral1/memory/2696-24-0x0000000004EA0000-0x0000000004EE4000-memory.dmp family_redline behavioral1/memory/2696-82-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-89-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-86-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-84-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-80-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-76-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-74-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-73-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-70-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-68-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-64-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-60-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-58-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-57-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-54-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-52-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-50-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-46-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-44-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-42-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-40-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-38-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-36-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-34-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-32-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-78-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-66-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-62-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-48-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-25-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-30-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-28-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline behavioral1/memory/2696-26-0x0000000004EA0000-0x0000000004EDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4188 vPj26.exe 1828 voi76.exe 2696 drb85.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vPj26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" voi76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vPj26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voi76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drb85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 drb85.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4188 2848 2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe 84 PID 2848 wrote to memory of 4188 2848 2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe 84 PID 2848 wrote to memory of 4188 2848 2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe 84 PID 4188 wrote to memory of 1828 4188 vPj26.exe 86 PID 4188 wrote to memory of 1828 4188 vPj26.exe 86 PID 4188 wrote to memory of 1828 4188 vPj26.exe 86 PID 1828 wrote to memory of 2696 1828 voi76.exe 87 PID 1828 wrote to memory of 2696 1828 voi76.exe 87 PID 1828 wrote to memory of 2696 1828 voi76.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe"C:\Users\Admin\AppData\Local\Temp\2265eacd76517f77ebb7007876656dd0153ca63e515158509cda25a128985a30.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPj26.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPj26.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\voi76.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\voi76.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\drb85.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\drb85.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD5960c7e329238c16ce5045f17c65f6125
SHA16cc801e4719bcfcf3c4c21d682ddef561ad0cd30
SHA256e299cce3c7f2bf06e596f72865c40d6878897c95952cb20430edba016efa7348
SHA512f30acefe90cf2bbfc6737d31bb377fc705d8996135e27d97668cdb609ba1bfd541d27c734e1a61b6214b7c19b26a249764317b7389bb1873e4248dfa4325348e
-
Filesize
491KB
MD59290384a13a8e092f3cba2040f3264ba
SHA1a2e064af02d3400a26eafcd35d97e761c121199b
SHA25655f52c2bf7735f6d9a97f4bb255a341f562b92d35b62f3633b18dce6ccda0f15
SHA512d791d9ba6e722ba70464afcf4e71bd30f03f7c1aadf9895aaa2faa399cc8bdab72607fd065ad77a85df35080cbfaf6e973fcefb07219596c44947492a85afe15
-
Filesize
293KB
MD5b5b088e47af91c344e3583ef9391586f
SHA181c28284f693f66d1d30b8ee09f0d69e27457333
SHA2563f201ce75b624c56d73e6aa11e0d93825455d0ee88d3fdcc8e2f3bafae6cc739
SHA5129d0789dfa16b849709e3bb04159ed2bf6ccd74975472efe87aeb9d8ff0539b8953cb0937b4d646fba7d1460ea8c1fd0ee4dfb9ec2debfefdee70ab9b05ca1a3b