Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe
Resource
win10v2004-20241007-en
General
-
Target
4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe
-
Size
536KB
-
MD5
817bf223240befb04b72e0ac1535d1d4
-
SHA1
ec37ecbddfd840faa0bb07db181ac65b74913313
-
SHA256
4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552
-
SHA512
1a408beb4b42410cf2f961d98d4dd48bbe3b2608f3307cf21bb62aa0306e247355baf2d5360c08705c717eda9135c9a6a0b9765885af8feeb33887987045f5ae
-
SSDEEP
12288:qMrIy902Fxt/spaPiZzYTsMs0dncPlW8xEcLoAf4rbGkhWN:ey5xt/spaPiZ2a0dcPl91LZMp8
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1644-19-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/1644-21-0x0000000002870000-0x00000000028B4000-memory.dmp family_redline behavioral1/memory/1644-63-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-81-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-85-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-83-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-79-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-77-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-75-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-73-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-71-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-69-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-67-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-65-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-61-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-60-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-57-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-53-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-51-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-49-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-47-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-45-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-41-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-39-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-37-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-35-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-33-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-31-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-29-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-27-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-55-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-43-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-25-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-23-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/1644-22-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3400 vGx17.exe 1644 dDI73.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vGx17.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vGx17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dDI73.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1644 dDI73.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3400 4280 4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe 83 PID 4280 wrote to memory of 3400 4280 4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe 83 PID 4280 wrote to memory of 3400 4280 4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe 83 PID 3400 wrote to memory of 1644 3400 vGx17.exe 84 PID 3400 wrote to memory of 1644 3400 vGx17.exe 84 PID 3400 wrote to memory of 1644 3400 vGx17.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe"C:\Users\Admin\AppData\Local\Temp\4b0a154e63667842a1ba7b011338281f00b35b9c72a6444412de3a9afcd23552.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGx17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGx17.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDI73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDI73.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD5d62b6e573ede7e7a3e324c5d860c91ba
SHA15485ad7701c230efb981925fb00ef57c42920b9f
SHA256291ad32a8a433dce1f33fa0d194ee947685e50c0205f64d7a9388c6ee7abcd73
SHA51272b07d3f01086151e8e6c7459f3dba82026bed6e95b625170293ec27b63b486fb8101b8698156378bb45edae1466eccb93eac603193ed0fae243367f4ab5cfe8
-
Filesize
292KB
MD58f3ee54e97d308acf52c687634cdb7d4
SHA1897ac33223537678c75849d57aefa851b232db09
SHA256f4c614372eb33ca63672f7a0e6c868b22626662f42bfc9b056fa38ee8e8aedc9
SHA512e1a07adfa12c535e7ced4e63e02feabb6a0ef06fcd69afaae640bcb44dc8eaebeff8fe0c70fcdb6d8134dad57987cbb0ba907efecaa075d5974601c680431df5