Analysis

  • max time kernel
    313s
  • max time network
    367s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2023, 12:27

General

  • Target

    fc458371368ddd5d1cca2954a55ee367c048c8c8bd936d3cd2deceec2fed81b4.exe

  • Size

    472KB

  • MD5

    48e6a8f6455468fdee319f8805cbcabf

  • SHA1

    dd919127c4dbb7e0f050f810c31b55a3b0f9bd37

  • SHA256

    fc458371368ddd5d1cca2954a55ee367c048c8c8bd936d3cd2deceec2fed81b4

  • SHA512

    a915666a265a5acb5965a118e38aeec02091c94920b28ac990ad5a45ef0155931a6bbb41c8521148ad2001ed502bd7e36865196ed23145da914e8835bcc83186

  • SSDEEP

    6144:KMy+bnr+2p0yN90QEdXdT6VBouFo+yWkywF4+v54ObjdMTxrf1ZtlxL0y/CAgvv/:8Mrey90zh6VC++QObjUrffJTCju0Dv

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc458371368ddd5d1cca2954a55ee367c048c8c8bd936d3cd2deceec2fed81b4.exe
    "C:\Users\Admin\AppData\Local\Temp\fc458371368ddd5d1cca2954a55ee367c048c8c8bd936d3cd2deceec2fed81b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsr85.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsr85.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\brT09.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\brT09.exe
        3⤵
        • Executes dropped EXE
        PID:4824

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsr85.exe

          Filesize

          202KB

          MD5

          4fab0e53fdfe5baafcd07d213aa28554

          SHA1

          9667fd2cbdfe727d4bfebb9846251432837d783a

          SHA256

          77303f95cddb7cc6134939b4caa0d1ffb0b8d99295296b7442df47f82e61c697

          SHA512

          66a82fac4abfb880d1830eb927395d3a233942bfb01e966a256d2f214cf4d1d18788fd7181f4e321dda8ab695fe472b09ac94ebf0797db0f449546cc4aaca884

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsr85.exe

          Filesize

          202KB

          MD5

          4fab0e53fdfe5baafcd07d213aa28554

          SHA1

          9667fd2cbdfe727d4bfebb9846251432837d783a

          SHA256

          77303f95cddb7cc6134939b4caa0d1ffb0b8d99295296b7442df47f82e61c697

          SHA512

          66a82fac4abfb880d1830eb927395d3a233942bfb01e966a256d2f214cf4d1d18788fd7181f4e321dda8ab695fe472b09ac94ebf0797db0f449546cc4aaca884

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\brT09.exe

          Filesize

          175KB

          MD5

          da6f3bef8abc85bd09f50783059964e3

          SHA1

          a0f25f60ec1896c4c920ea397f40e6ce29724322

          SHA256

          e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

          SHA512

          4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\brT09.exe

          Filesize

          175KB

          MD5

          da6f3bef8abc85bd09f50783059964e3

          SHA1

          a0f25f60ec1896c4c920ea397f40e6ce29724322

          SHA256

          e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

          SHA512

          4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

        • memory/4824-141-0x00000000056C0000-0x00000000057CA000-memory.dmp

          Filesize

          1.0MB

        • memory/4824-139-0x00000000009A0000-0x00000000009D2000-memory.dmp

          Filesize

          200KB

        • memory/4824-140-0x0000000005BC0000-0x00000000061D8000-memory.dmp

          Filesize

          6.1MB

        • memory/4824-142-0x00000000055F0000-0x0000000005602000-memory.dmp

          Filesize

          72KB

        • memory/4824-143-0x0000000005650000-0x000000000568C000-memory.dmp

          Filesize

          240KB

        • memory/4824-144-0x0000000006790000-0x0000000006D34000-memory.dmp

          Filesize

          5.6MB

        • memory/4824-145-0x0000000005980000-0x0000000005A12000-memory.dmp

          Filesize

          584KB

        • memory/4824-146-0x0000000005860000-0x00000000058C6000-memory.dmp

          Filesize

          408KB

        • memory/4824-147-0x0000000006D40000-0x0000000006F02000-memory.dmp

          Filesize

          1.8MB

        • memory/4824-148-0x0000000007440000-0x000000000796C000-memory.dmp

          Filesize

          5.2MB