Analysis

  • max time kernel
    228s
  • max time network
    285s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:42

General

  • Target

    da72f2cb6f684fb1e0b20d1f48fa218eed5742f3288a4cda9b45ef4dc0503ceb.exe

  • Size

    1.5MB

  • MD5

    e151f1b1bcf6a54cce98e1ddc76a2bfe

  • SHA1

    1975670e187659e6b145f5fd02271d6778131b8c

  • SHA256

    da72f2cb6f684fb1e0b20d1f48fa218eed5742f3288a4cda9b45ef4dc0503ceb

  • SHA512

    7b08d520483e6595c5a7a142e9d93f0736a50472c62dc766823f20dc8c83d30d3809f07587fe34df85dbadbaeb514e4edf6c8cc5eac75a40784f59662cf26d0d

  • SSDEEP

    24576:xyUA3zBAhj3Z8cn5RvogpsAwVmJXG0sj0gmRz4CJTAIj0aP2uq5Y:kUADBAhN8c5lobAwVm5W9CJ340

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da72f2cb6f684fb1e0b20d1f48fa218eed5742f3288a4cda9b45ef4dc0503ceb.exe
    "C:\Users\Admin\AppData\Local\Temp\da72f2cb6f684fb1e0b20d1f48fa218eed5742f3288a4cda9b45ef4dc0503ceb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83059884.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83059884.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i04947957.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i04947957.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93713933.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93713933.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4748
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i71634808.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i71634808.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3868
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20582316.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20582316.exe
              6⤵
              • Executes dropped EXE
              PID:4708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83059884.exe

    Filesize

    1.3MB

    MD5

    75e2e8a68f3e169ca335ced472c76eb2

    SHA1

    13a26523dcb297127a80440db2f7fbef9ca28e96

    SHA256

    099ff1a452fd989eeca271c8ff3f4a403dd873d799339f3bfd0a6e1f0dd0f22f

    SHA512

    dca86ab91577a033cafbee40098a0ecabbbfd4cc3952525bcf3ca663beadb83a79ac414fda16f581f50bb63084e715d6f75ee350f240ae45bcaf6b95d401b397

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83059884.exe

    Filesize

    1.3MB

    MD5

    75e2e8a68f3e169ca335ced472c76eb2

    SHA1

    13a26523dcb297127a80440db2f7fbef9ca28e96

    SHA256

    099ff1a452fd989eeca271c8ff3f4a403dd873d799339f3bfd0a6e1f0dd0f22f

    SHA512

    dca86ab91577a033cafbee40098a0ecabbbfd4cc3952525bcf3ca663beadb83a79ac414fda16f581f50bb63084e715d6f75ee350f240ae45bcaf6b95d401b397

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i04947957.exe

    Filesize

    1016KB

    MD5

    2888bcf1c957d110fce19b396aa4b7c1

    SHA1

    378836ee5a12eeb76d8024c10a8bd592b80295ff

    SHA256

    aeb2045004143e7d484345a685c6ef3f68ac8245da91017f946e408ce745d4dc

    SHA512

    97efa9c030c6ea95ded5c58346112188f1e46657c0138ec056a4826999a8d7dd5e7ab1fb37c779c8ca1bf5236382147897f4ef1fe831afbf9e17d8ca5bfdb523

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i04947957.exe

    Filesize

    1016KB

    MD5

    2888bcf1c957d110fce19b396aa4b7c1

    SHA1

    378836ee5a12eeb76d8024c10a8bd592b80295ff

    SHA256

    aeb2045004143e7d484345a685c6ef3f68ac8245da91017f946e408ce745d4dc

    SHA512

    97efa9c030c6ea95ded5c58346112188f1e46657c0138ec056a4826999a8d7dd5e7ab1fb37c779c8ca1bf5236382147897f4ef1fe831afbf9e17d8ca5bfdb523

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93713933.exe

    Filesize

    844KB

    MD5

    80c5e9c28271e21d5a6b88fa6c819c00

    SHA1

    31fb791a8f63c7821bc475788b12e96dfbb933fe

    SHA256

    52f765844623c2f90315854ca382dca7f7ef1a177e87f482fcb7998f540406e0

    SHA512

    83862d521f563c7afd58429b2ce8e35308cc433608af84eb27a008c79d4b40454624321a1cd1b05c7c213160a39c22f3f3a21365f9543386d34ec3e80de4ab24

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93713933.exe

    Filesize

    844KB

    MD5

    80c5e9c28271e21d5a6b88fa6c819c00

    SHA1

    31fb791a8f63c7821bc475788b12e96dfbb933fe

    SHA256

    52f765844623c2f90315854ca382dca7f7ef1a177e87f482fcb7998f540406e0

    SHA512

    83862d521f563c7afd58429b2ce8e35308cc433608af84eb27a008c79d4b40454624321a1cd1b05c7c213160a39c22f3f3a21365f9543386d34ec3e80de4ab24

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i71634808.exe

    Filesize

    371KB

    MD5

    861b034b9d1fd6977a2cabb72044a6a8

    SHA1

    810f628adbef8b54735883617f67a585ee7eb1bf

    SHA256

    f43694e668258003a175a2f86c35fbf4b1724a99d0baba7474ad90c92692041b

    SHA512

    5170e2f1f9b333b33575438b95fcd71ee83f7865f0f42a1532582df4eab4ca0828ca72354e2a5cc498465f64adc63485d65f9b2ab3e4c4e0cb4971f7b21cdd82

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i71634808.exe

    Filesize

    371KB

    MD5

    861b034b9d1fd6977a2cabb72044a6a8

    SHA1

    810f628adbef8b54735883617f67a585ee7eb1bf

    SHA256

    f43694e668258003a175a2f86c35fbf4b1724a99d0baba7474ad90c92692041b

    SHA512

    5170e2f1f9b333b33575438b95fcd71ee83f7865f0f42a1532582df4eab4ca0828ca72354e2a5cc498465f64adc63485d65f9b2ab3e4c4e0cb4971f7b21cdd82

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20582316.exe

    Filesize

    169KB

    MD5

    e3910c70876d2cf8e33d1949f9aa09f2

    SHA1

    f338e8b564e8a8b4ac6b33ab8287e000e4f3ea19

    SHA256

    2d715e490c801611472e9935c22561689f25957aafaa11d0e7ea6a61ddf060bb

    SHA512

    c576861d4c9d52c974f1a8cdbad766e599970c0f27aa014abd83ccca0e347d9d005cf3f3d002653d9f2bcf3b77f5ad3475e332ce68f40975d71c9ba705bcadf8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20582316.exe

    Filesize

    169KB

    MD5

    e3910c70876d2cf8e33d1949f9aa09f2

    SHA1

    f338e8b564e8a8b4ac6b33ab8287e000e4f3ea19

    SHA256

    2d715e490c801611472e9935c22561689f25957aafaa11d0e7ea6a61ddf060bb

    SHA512

    c576861d4c9d52c974f1a8cdbad766e599970c0f27aa014abd83ccca0e347d9d005cf3f3d002653d9f2bcf3b77f5ad3475e332ce68f40975d71c9ba705bcadf8

  • memory/4708-168-0x0000000000320000-0x0000000000350000-memory.dmp

    Filesize

    192KB

  • memory/4708-169-0x0000000005340000-0x0000000005958000-memory.dmp

    Filesize

    6.1MB

  • memory/4708-170-0x0000000004E30000-0x0000000004F3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4708-171-0x0000000004B60000-0x0000000004B72000-memory.dmp

    Filesize

    72KB

  • memory/4708-172-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/4708-173-0x0000000004BC0000-0x0000000004BFC000-memory.dmp

    Filesize

    240KB

  • memory/4708-174-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB