Analysis

  • max time kernel
    149s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2023, 20:41

General

  • Target

    file.exe

  • Size

    724KB

  • MD5

    4b49cf66891946bfc7a26cb9dccc2bf6

  • SHA1

    beb3853442242bc3d0d87f6c6d48103f64519316

  • SHA256

    5bf42229296a3563062d742c126b9ae2c104e186dab00ed3290c9de0a1ba8113

  • SHA512

    ec57f8c0352dca32f020872752adc802790ab7db4ca32cc7fc3938051d4764401ba0bb6d1a55c3d52b9cc8f36f614f188fb1fb950c7117f0698c543632b3c3ab

  • SSDEEP

    12288:DMrty90pqRbXxPSLpD5fG5u0tqt3teJRlkUcaTzENhpC5NkUE:SyoMhPSLpD5fG808t+fNZTINhbUE

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gXx22aL.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gXx22aL.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gaV96iG.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gaV96iG.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aPI21IZ.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aPI21IZ.exe
          4⤵
          • Executes dropped EXE
          PID:2476

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gXx22aL.exe

          Filesize

          620KB

          MD5

          c1571691603f75f3577b1cde63fa414f

          SHA1

          6163fe55ba9998afda8b04450cb3543044646f1d

          SHA256

          19644d262109ce2acfafef59caf1238f62be8be8e3c8eee897e9203521d80b2a

          SHA512

          053d69508e91d092499ee7a060378d96032f86f25ec9d65373faa8c28d4da7f84d3dc88e5f5a8dabbcc2a5c99969e8ccc9e20ecc7f1ff7c7005cf774ec8cb89a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gXx22aL.exe

          Filesize

          620KB

          MD5

          c1571691603f75f3577b1cde63fa414f

          SHA1

          6163fe55ba9998afda8b04450cb3543044646f1d

          SHA256

          19644d262109ce2acfafef59caf1238f62be8be8e3c8eee897e9203521d80b2a

          SHA512

          053d69508e91d092499ee7a060378d96032f86f25ec9d65373faa8c28d4da7f84d3dc88e5f5a8dabbcc2a5c99969e8ccc9e20ecc7f1ff7c7005cf774ec8cb89a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gaV96iG.exe

          Filesize

          286KB

          MD5

          4557b78f632de9dd74e4795b34687136

          SHA1

          54234e795487697d05350ab784ffc0da689b1ac3

          SHA256

          e68163c8ee25368d8653bf82437b919da5dfa7242b1f6ce2528c3fdf74588968

          SHA512

          14ceab89db1ac2476cf9b61b273123b20e894a1ccb3cc01b045119fa6555aaf2ae9ccb3c9029abcccf361730e47851fa1362a8d02751e47192a09035212ef1be

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gaV96iG.exe

          Filesize

          286KB

          MD5

          4557b78f632de9dd74e4795b34687136

          SHA1

          54234e795487697d05350ab784ffc0da689b1ac3

          SHA256

          e68163c8ee25368d8653bf82437b919da5dfa7242b1f6ce2528c3fdf74588968

          SHA512

          14ceab89db1ac2476cf9b61b273123b20e894a1ccb3cc01b045119fa6555aaf2ae9ccb3c9029abcccf361730e47851fa1362a8d02751e47192a09035212ef1be

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aPI21IZ.exe

          Filesize

          175KB

          MD5

          69f79e05d0c83aee310d9adfe5aa7f2b

          SHA1

          485c490180380051a14316564fbda07723be11b1

          SHA256

          c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

          SHA512

          f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aPI21IZ.exe

          Filesize

          175KB

          MD5

          69f79e05d0c83aee310d9adfe5aa7f2b

          SHA1

          485c490180380051a14316564fbda07723be11b1

          SHA256

          c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

          SHA512

          f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

        • memory/2476-141-0x00000000003A0000-0x00000000003D2000-memory.dmp

          Filesize

          200KB

        • memory/2476-142-0x00000000055A0000-0x0000000005BB8000-memory.dmp

          Filesize

          6.1MB

        • memory/2476-143-0x00000000050D0000-0x00000000051DA000-memory.dmp

          Filesize

          1.0MB

        • memory/2476-144-0x0000000004FF0000-0x0000000005002000-memory.dmp

          Filesize

          72KB

        • memory/2476-145-0x0000000005050000-0x000000000508C000-memory.dmp

          Filesize

          240KB