Analysis
-
max time kernel
111s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe
Resource
win10v2004-20241007-en
General
-
Target
29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe
-
Size
589KB
-
MD5
45429f222959fd2fe61b1606311b2180
-
SHA1
6da813793ccfb63cbecedb445af6280becbeda77
-
SHA256
29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2
-
SHA512
c93fc2004d077b1e4f51d55850b3f594faa4827a122aafbc1a0cf52ce2f8f1678b9c9441f9bc230217095ddcf8c7f8a03ec1149cdaa22768e54f68172f22141f
-
SSDEEP
12288:zMrjy90slIo7NOFrOgVrl2rgWh3FQzze:wyv57NOFJ1WBSzze
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4464-9-0x0000000000580000-0x00000000005B2000-memory.dmp family_redline behavioral1/memory/2016-25-0x0000000004A70000-0x0000000004AB6000-memory.dmp family_redline behavioral1/memory/2016-27-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/2016-69-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-83-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-85-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-81-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-79-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-77-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-75-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-73-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-71-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-65-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-64-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-61-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-59-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-57-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-55-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-54-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-51-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-47-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-43-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-41-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-39-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-37-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-35-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-33-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-31-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-29-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-68-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-49-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-45-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2016-28-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2748 dOH21.exe 2016 lNK21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 4464 2748 dOH21.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dOH21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lNK21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2016 lNK21.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 752 wrote to memory of 2748 752 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe 84 PID 752 wrote to memory of 2748 752 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe 84 PID 752 wrote to memory of 2748 752 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe 84 PID 2748 wrote to memory of 4464 2748 dOH21.exe 86 PID 2748 wrote to memory of 4464 2748 dOH21.exe 86 PID 2748 wrote to memory of 4464 2748 dOH21.exe 86 PID 2748 wrote to memory of 4464 2748 dOH21.exe 86 PID 2748 wrote to memory of 4464 2748 dOH21.exe 86 PID 752 wrote to memory of 2016 752 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe 87 PID 752 wrote to memory of 2016 752 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe 87 PID 752 wrote to memory of 2016 752 29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe"C:\Users\Admin\AppData\Local\Temp\29c8158e49502f75b48b64e3dc7e79509677d61000bb5f9caacd8a6d24b2dfd2N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dOH21.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dOH21.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lNK21.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lNK21.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
485KB
MD52ccd01c92399fe932126e1ce38c62565
SHA1316e0ec4f0c22a6eb4095cfb03ddb9a38aed8cdc
SHA25642cfcf278f98d0cb0268be1fbc5eb602dd06a83deca627e3b46942dcb678a6ed
SHA512acdad4be559fa272111a72647f8f7c7501de42192b570520a91695d170c41b6d62f7cdb99b583a106514a648ba7b27ede0095028b965502fd7ba7c5e32c01aa5