Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe
Resource
win10v2004-20241007-en
General
-
Target
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe
-
Size
839KB
-
MD5
d5618df7549a93341823b3d0c276ff46
-
SHA1
d942ab0867e770f29c69ef95366e86c95f861cd0
-
SHA256
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69
-
SHA512
073bb3407669e8bbdedd02bcfc6059bf3c76770ff0cd3866342ec1a62a29976240fc4467d4b31c1ff2a4a2f33161aa9a3088a533ebe12e2bba9eb0771de5f850
-
SSDEEP
12288:KMrdy90RJy1j+1OS1ekd+Cyom938NOfrO2CuHHKaGEQNe239ZrTUdUKWZz15k5sC:7yYyj+8Vlb93IOfFnHqJc6ZmUKwQKC
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2144-23-0x0000000000400000-0x0000000000432000-memory.dmp family_redline behavioral1/memory/732-37-0x0000000002390000-0x00000000023D6000-memory.dmp family_redline behavioral1/memory/732-39-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/732-75-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-77-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-97-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-95-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-93-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-90-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-87-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-85-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-83-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-79-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-73-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-69-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-67-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-65-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-63-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-61-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-59-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-57-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-55-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-53-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-51-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-49-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-47-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-45-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-43-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-91-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-41-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-81-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-40-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/732-71-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3232 dmY74.exe 1432 dJs18.exe 312 dNv29.exe 732 lrZ84.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dmY74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dJs18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 312 set thread context of 2144 312 dNv29.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmY74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dJs18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dNv29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrZ84.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 732 lrZ84.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1020 wrote to memory of 3232 1020 1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe 83 PID 1020 wrote to memory of 3232 1020 1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe 83 PID 1020 wrote to memory of 3232 1020 1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe 83 PID 3232 wrote to memory of 1432 3232 dmY74.exe 85 PID 3232 wrote to memory of 1432 3232 dmY74.exe 85 PID 3232 wrote to memory of 1432 3232 dmY74.exe 85 PID 1432 wrote to memory of 312 1432 dJs18.exe 87 PID 1432 wrote to memory of 312 1432 dJs18.exe 87 PID 1432 wrote to memory of 312 1432 dJs18.exe 87 PID 312 wrote to memory of 2144 312 dNv29.exe 89 PID 312 wrote to memory of 2144 312 dNv29.exe 89 PID 312 wrote to memory of 2144 312 dNv29.exe 89 PID 312 wrote to memory of 2144 312 dNv29.exe 89 PID 312 wrote to memory of 2144 312 dNv29.exe 89 PID 1432 wrote to memory of 732 1432 dJs18.exe 90 PID 1432 wrote to memory of 732 1432 dJs18.exe 90 PID 1432 wrote to memory of 732 1432 dJs18.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe"C:\Users\Admin\AppData\Local\Temp\1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmY74.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmY74.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dJs18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dJs18.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dNv29.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dNv29.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrZ84.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrZ84.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD51823feace87da23ea18cb363c4ce5a0d
SHA1e5850f4cf5d6364c175924a32ce46c59e88b1ab2
SHA2560233ff6a76c46289df076b86b8ce96a2099d800db374a25825ce1f9c0f1ccb80
SHA512ced88ad5fa244f69d184777964ee248f6436fb2eb0304e6dc2da62e77ac2feef7f6c45e59dbbe79a66a51630410c0f51484d0e5a94cf101f8ed3c52caf2aca3a
-
Filesize
590KB
MD581bbf0381964e321228d17d6c2a3efad
SHA1ed2e8d0910447b519d4d81d580c02077a5c557d8
SHA2568610f4b6b2f5cb2ef0dd3ce428e9e6384af19606bd93a132d8600102003e96eb
SHA5120c461de9f48f1c4745a54cd13a41a61d8364ace47405dbb0871875a99904a58cf83cb385c034e3dce4f9c89aaed973ed00b6dfb4ea705b65cb896430acde17ee
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
485KB
MD5aea6aaf78390cfdddb11904f65af65c0
SHA1d6205779d018d5b5c7e5ba17b5bc5815768b63db
SHA2569e4d64522aa801b84f97f5e2f26ca5ff762f3c882355db3011d596ab246c980f
SHA512abea52f55e28af7b3eecd7ba0a863ca0c0a4489b41af5508abb7428d3bac5c7425f4d2a2342f9851b50bc9f2ea4ebf32e8653913014e01fe73f844ec18d1a730