Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe
Resource
win10v2004-20241007-en
General
-
Target
b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe
-
Size
665KB
-
MD5
dff94bfba00bfbc1e25db393e65e3fe8
-
SHA1
3af31d912121cb74bf71e0cd958c205963c8af55
-
SHA256
b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e
-
SHA512
00f6bca6213bf7d1107926985272affaa5acf6d6be175aae6887a4434498d8f5ccd2143ab49a87320a961356988a61b84cb5036dc9552ff7e655dbe3c02493a9
-
SSDEEP
12288:IMr6y90/4Di6xLb/j4G5qwZnSVdxLMserQ8Tb+PgnpMs:SyK+YGYAn0XeUr4nis
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3648-19-0x00000000024A0000-0x00000000024E6000-memory.dmp family_redline behavioral1/memory/3648-21-0x0000000004BD0000-0x0000000004C14000-memory.dmp family_redline behavioral1/memory/3648-59-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-43-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-33-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-85-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-83-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-82-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-79-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-77-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-75-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-73-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-71-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-69-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-67-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-65-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-63-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-61-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-57-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-55-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-53-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-51-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-49-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-47-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-45-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-41-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-39-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-37-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-35-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-31-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-29-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-27-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-26-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-23-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3648-22-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2108 vBd05.exe 3648 dRR33.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vBd05.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vBd05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dRR33.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3648 dRR33.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3604 wrote to memory of 2108 3604 b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe 83 PID 3604 wrote to memory of 2108 3604 b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe 83 PID 3604 wrote to memory of 2108 3604 b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe 83 PID 2108 wrote to memory of 3648 2108 vBd05.exe 84 PID 2108 wrote to memory of 3648 2108 vBd05.exe 84 PID 2108 wrote to memory of 3648 2108 vBd05.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe"C:\Users\Admin\AppData\Local\Temp\b3e3ae4533bb2f6a2a1892cbeec7dfeae217ae06833f331bd161fe703046cf7e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBd05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBd05.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRR33.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRR33.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5a51a2ed642d47aab7691d38d03ae5e48
SHA19929cf911ae5f347733d8301dfec44f39443ef66
SHA25669d9693f7011b73c26b1cf7829a0a46c116f10be22f301148ff78ac106f99443
SHA512cdbc49b3ee837edb3d6db28769cbe087d172da11f37eef4353130a255423de28c7e1d2ee5fd42ffb9afd5601580075247ee4f1b62a13cebbfba725346b469f79
-
Filesize
305KB
MD52912e4ea81ea3271b0533d672791b1ad
SHA1b5ef6b062c57da9614baf0faa3270eb6778a940c
SHA256171384e592b4da9bac78fbcb0feb4d46de8e302c960ed3464a399bb3c023253c
SHA51265be335994bb6bb1bb636001afcefd0d3a1052ef4e863f0613a0ba352e6af62dc469d09cdfc3a559e8e6a2cbebf92cc74cc11b5f39c1cb19cec82f6c77b859a2