Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2023 22:56

General

  • Target

    FortHack.exe

  • Size

    2.5MB

  • MD5

    c4d460b4f7da75c7db76347d8de50093

  • SHA1

    d9e250bee98b5d46e6929c6df3c129aa94ca2a40

  • SHA256

    2da73bff9624b981e8bedce6cb13d4593eaf758f70bd2ece15dde5ffc6fda065

  • SHA512

    9fc9fe17ffb5631fd01328bfe9f02f897808cda30969616d279346b2b69c3982858bd36657c5c2b725c934e1350118ca55026c91937e8ee7b540482ca1992333

  • SSDEEP

    24576:2AaodXP6bRPbWYhYOxlwvBVMT+dLEEuoi/GPCOPv1cmd5LZRiI1l3RuQ55313A:28dfiRPe9ShOH1cmd5aI1l3i

Malware Config

Extracted

Family

redline

Botnet

@quppie2000

C2

193.233.193.15:27469

Attributes
  • auth_value

    a2207993338b21fa7a2f1e35520a5d07

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FortHack.exe
    "C:\Users\Admin\AppData\Local\Temp\FortHack.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:188080

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2240-138-0x0000000000400000-0x0000000000573000-memory.dmp

      Filesize

      1.4MB

    • memory/188080-133-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/188080-139-0x0000000005610000-0x0000000005C28000-memory.dmp

      Filesize

      6.1MB

    • memory/188080-140-0x0000000005060000-0x0000000005072000-memory.dmp

      Filesize

      72KB

    • memory/188080-141-0x0000000005190000-0x000000000529A000-memory.dmp

      Filesize

      1.0MB

    • memory/188080-142-0x0000000005130000-0x0000000005140000-memory.dmp

      Filesize

      64KB

    • memory/188080-143-0x00000000050C0000-0x00000000050FC000-memory.dmp

      Filesize

      240KB

    • memory/188080-144-0x0000000005130000-0x0000000005140000-memory.dmp

      Filesize

      64KB