Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe
Resource
win10v2004-20241007-en
General
-
Target
6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe
-
Size
584KB
-
MD5
4b3647f84b54142bd5e1fac8191fc158
-
SHA1
9e16fd5c266f3d35062a2d358efa4908323576b9
-
SHA256
6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d
-
SHA512
295b38cba2901988d57079649f83138f648f05f1497808156b4e8a9f2e8d0a36f42c2a671ac470597ec5dffc9765e1663dd32854f319a99bfb9baff5319290a0
-
SSDEEP
12288:KMr4y90Bp5oqXewrirRlT65E+3grBBcOhn2A7FkUV4PeER6Ce:GyTqXd+rXGQh2SFJseER6J
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1164-19-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/1164-21-0x0000000002600000-0x0000000002644000-memory.dmp family_redline behavioral1/memory/1164-25-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-85-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-83-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-81-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-79-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-77-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-73-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-71-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-69-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-67-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-65-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-63-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-61-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-59-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-55-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-53-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-51-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-49-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-47-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-45-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-43-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-41-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-39-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-37-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-35-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-33-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-31-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-29-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-27-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-23-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-75-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-57-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/1164-22-0x0000000002600000-0x000000000263E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2260 dTe8021.exe 1164 ndw15Zj.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dTe8021.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dTe8021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndw15Zj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1164 ndw15Zj.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3152 wrote to memory of 2260 3152 6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe 84 PID 3152 wrote to memory of 2260 3152 6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe 84 PID 3152 wrote to memory of 2260 3152 6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe 84 PID 2260 wrote to memory of 1164 2260 dTe8021.exe 85 PID 2260 wrote to memory of 1164 2260 dTe8021.exe 85 PID 2260 wrote to memory of 1164 2260 dTe8021.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe"C:\Users\Admin\AppData\Local\Temp\6e4a310fb0fc448d5053f898e0f75e2fea5304d2ec6d606e6235537e49e3f91d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dTe8021.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dTe8021.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ndw15Zj.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ndw15Zj.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD56bdd686cc5593908dbfa5af2299ebb6c
SHA1fab5e2a9af412abc02d8710026a3313991ef1dce
SHA25690802e6ba0d308288940a8f47a49d6d43390ff563070008bbb531b3a928710a5
SHA51252d8683afbb1f2259cf184da405851669095dadca26bd09b728977abbab242ae3ef172a1e7cea351875d07ab8712a204ec6e1a1476db558fce5deaea6b57a89f
-
Filesize
303KB
MD57f7228945fb15bdcd6e792cc10b4577e
SHA1c044eee37ce4c2fd72a42725179562c4acf2a93e
SHA2563bbee457fa567f17bea91ed97dfc35314b3af607008e54bf7b8e465591287f75
SHA512ffe7dd8b40cd56661a066adc257ee5a263f88d4b52a4b3bf592001c3eb43a1875adcaef3444e72a15187dda0808348d5a66734f0d481e2315f4100738a88ea95