Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:25

General

  • Target

    c200bc513ec20affb4c135af8ec8d94bc6db688e00c2add59ad1903264546a76.exe

  • Size

    1.5MB

  • MD5

    181826e9fb56d1468f454b9a2ac58f7e

  • SHA1

    c562e699297d0148be0bd666f3b7a9b1ce7753b7

  • SHA256

    c200bc513ec20affb4c135af8ec8d94bc6db688e00c2add59ad1903264546a76

  • SHA512

    0969e742ea2b1856e115483b97d26536a6d404f6c280cc3d1bb6a85c557f7d5d4185b3fc54fcbf0018bfd9ff272087eb2371a46067608b4d0e4015226f844ffe

  • SSDEEP

    24576:NyC1NQ63VXpZd2PLBl6gd2brWwoSDz2OPzlqSP0UGjGSx/C3W7vcpNwgzB4ToHIz:oC1vV5b2PLBl6zbrtVuOPzlq20Jf6G7t

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c200bc513ec20affb4c135af8ec8d94bc6db688e00c2add59ad1903264546a76.exe
    "C:\Users\Admin\AppData\Local\Temp\c200bc513ec20affb4c135af8ec8d94bc6db688e00c2add59ad1903264546a76.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i57944430.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i57944430.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i21220217.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i21220217.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i83116831.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i83116831.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i55153703.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i55153703.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1684
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a02714934.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a02714934.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i57944430.exe

    Filesize

    1.3MB

    MD5

    3945b95e9036e306fa28a2a23b86277a

    SHA1

    46e46221382c2380c41b2dc8a67852af6f6be64b

    SHA256

    5b791e25c5cd23a5309d27b360ac730d4a36f3420fc66acde87f8aecc361941c

    SHA512

    5f941499e9871f43073cc2516a98e5a2cb1a49029e7a1ad6c76fc8bc90a65a816546957b0d21528c866ee85d85dfbcfda00a7e03c5f09a29b9099049bdbb76fb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i57944430.exe

    Filesize

    1.3MB

    MD5

    3945b95e9036e306fa28a2a23b86277a

    SHA1

    46e46221382c2380c41b2dc8a67852af6f6be64b

    SHA256

    5b791e25c5cd23a5309d27b360ac730d4a36f3420fc66acde87f8aecc361941c

    SHA512

    5f941499e9871f43073cc2516a98e5a2cb1a49029e7a1ad6c76fc8bc90a65a816546957b0d21528c866ee85d85dfbcfda00a7e03c5f09a29b9099049bdbb76fb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i21220217.exe

    Filesize

    1015KB

    MD5

    b59ca9cda2f7e7379f292a799765a491

    SHA1

    7ac3c060b1fe98f883bd8a72f14b27443cee8c60

    SHA256

    eeba2235d7495c87156ed3467961e59e2f9873cb4ac0ce713fe5d1aecb305cd3

    SHA512

    0f096954bc0d7cfacd521cc31957fa0447623c42e6e12569478f133c347089f3de6db7de3ac890d614777e9d166f7fd69464805c736174fd4125ca702446b949

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i21220217.exe

    Filesize

    1015KB

    MD5

    b59ca9cda2f7e7379f292a799765a491

    SHA1

    7ac3c060b1fe98f883bd8a72f14b27443cee8c60

    SHA256

    eeba2235d7495c87156ed3467961e59e2f9873cb4ac0ce713fe5d1aecb305cd3

    SHA512

    0f096954bc0d7cfacd521cc31957fa0447623c42e6e12569478f133c347089f3de6db7de3ac890d614777e9d166f7fd69464805c736174fd4125ca702446b949

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i83116831.exe

    Filesize

    844KB

    MD5

    2cd0e8930ea587cbebdedad6fb5bb4de

    SHA1

    1a7ef0b1d9263ffe6c0bfdc18c21e4fe4eaef2e8

    SHA256

    2c82ea598d83f5d40b6298d2c2d2276c08130b51a6a37efe29019e3316b0cea3

    SHA512

    eb3df082515361bc79a3a867320171c9259c6325ed0bd8ec136c53caa282e483f598ead319fbf411eb08b7e5d5d47bb9311b8a7dfe1b673556247d36eb554ab6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i83116831.exe

    Filesize

    844KB

    MD5

    2cd0e8930ea587cbebdedad6fb5bb4de

    SHA1

    1a7ef0b1d9263ffe6c0bfdc18c21e4fe4eaef2e8

    SHA256

    2c82ea598d83f5d40b6298d2c2d2276c08130b51a6a37efe29019e3316b0cea3

    SHA512

    eb3df082515361bc79a3a867320171c9259c6325ed0bd8ec136c53caa282e483f598ead319fbf411eb08b7e5d5d47bb9311b8a7dfe1b673556247d36eb554ab6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i55153703.exe

    Filesize

    371KB

    MD5

    aa9094ca97eb29b24d02062c5bf5b33f

    SHA1

    fee171ab94f21dc5a7b5189266cf529f12cb655c

    SHA256

    2af8582a05bf0dd5850cad1dd6af2d7012490a3da5507311785bebf8e4e63545

    SHA512

    805b89938836ad2f1a30ff036375193de9281cffb435acc5dd0d900a8406cf54f7b521cc0b2236c84950a4d1d8e555502f8b13d62162f911454af30e3797b627

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i55153703.exe

    Filesize

    371KB

    MD5

    aa9094ca97eb29b24d02062c5bf5b33f

    SHA1

    fee171ab94f21dc5a7b5189266cf529f12cb655c

    SHA256

    2af8582a05bf0dd5850cad1dd6af2d7012490a3da5507311785bebf8e4e63545

    SHA512

    805b89938836ad2f1a30ff036375193de9281cffb435acc5dd0d900a8406cf54f7b521cc0b2236c84950a4d1d8e555502f8b13d62162f911454af30e3797b627

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a02714934.exe

    Filesize

    169KB

    MD5

    7f2584b4bb84cfbe4faf5e97d0ef3cf0

    SHA1

    cb3df329707bb03e870e468115e5bc4a84a38c5e

    SHA256

    865b8cea97b2d3efb400772e056bec368270a5c2733224d3462e5a8fb9f3f4a1

    SHA512

    75dfc052fcd8c6d8418e24dae0bb22c9700b2db593453261e29f693c488718f654ca02c2ef181603fe3dd64f9ebd3e0cd07157b40a693265099db31177ee4ec7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a02714934.exe

    Filesize

    169KB

    MD5

    7f2584b4bb84cfbe4faf5e97d0ef3cf0

    SHA1

    cb3df329707bb03e870e468115e5bc4a84a38c5e

    SHA256

    865b8cea97b2d3efb400772e056bec368270a5c2733224d3462e5a8fb9f3f4a1

    SHA512

    75dfc052fcd8c6d8418e24dae0bb22c9700b2db593453261e29f693c488718f654ca02c2ef181603fe3dd64f9ebd3e0cd07157b40a693265099db31177ee4ec7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i57944430.exe

    Filesize

    1.3MB

    MD5

    3945b95e9036e306fa28a2a23b86277a

    SHA1

    46e46221382c2380c41b2dc8a67852af6f6be64b

    SHA256

    5b791e25c5cd23a5309d27b360ac730d4a36f3420fc66acde87f8aecc361941c

    SHA512

    5f941499e9871f43073cc2516a98e5a2cb1a49029e7a1ad6c76fc8bc90a65a816546957b0d21528c866ee85d85dfbcfda00a7e03c5f09a29b9099049bdbb76fb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i57944430.exe

    Filesize

    1.3MB

    MD5

    3945b95e9036e306fa28a2a23b86277a

    SHA1

    46e46221382c2380c41b2dc8a67852af6f6be64b

    SHA256

    5b791e25c5cd23a5309d27b360ac730d4a36f3420fc66acde87f8aecc361941c

    SHA512

    5f941499e9871f43073cc2516a98e5a2cb1a49029e7a1ad6c76fc8bc90a65a816546957b0d21528c866ee85d85dfbcfda00a7e03c5f09a29b9099049bdbb76fb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i21220217.exe

    Filesize

    1015KB

    MD5

    b59ca9cda2f7e7379f292a799765a491

    SHA1

    7ac3c060b1fe98f883bd8a72f14b27443cee8c60

    SHA256

    eeba2235d7495c87156ed3467961e59e2f9873cb4ac0ce713fe5d1aecb305cd3

    SHA512

    0f096954bc0d7cfacd521cc31957fa0447623c42e6e12569478f133c347089f3de6db7de3ac890d614777e9d166f7fd69464805c736174fd4125ca702446b949

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i21220217.exe

    Filesize

    1015KB

    MD5

    b59ca9cda2f7e7379f292a799765a491

    SHA1

    7ac3c060b1fe98f883bd8a72f14b27443cee8c60

    SHA256

    eeba2235d7495c87156ed3467961e59e2f9873cb4ac0ce713fe5d1aecb305cd3

    SHA512

    0f096954bc0d7cfacd521cc31957fa0447623c42e6e12569478f133c347089f3de6db7de3ac890d614777e9d166f7fd69464805c736174fd4125ca702446b949

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i83116831.exe

    Filesize

    844KB

    MD5

    2cd0e8930ea587cbebdedad6fb5bb4de

    SHA1

    1a7ef0b1d9263ffe6c0bfdc18c21e4fe4eaef2e8

    SHA256

    2c82ea598d83f5d40b6298d2c2d2276c08130b51a6a37efe29019e3316b0cea3

    SHA512

    eb3df082515361bc79a3a867320171c9259c6325ed0bd8ec136c53caa282e483f598ead319fbf411eb08b7e5d5d47bb9311b8a7dfe1b673556247d36eb554ab6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i83116831.exe

    Filesize

    844KB

    MD5

    2cd0e8930ea587cbebdedad6fb5bb4de

    SHA1

    1a7ef0b1d9263ffe6c0bfdc18c21e4fe4eaef2e8

    SHA256

    2c82ea598d83f5d40b6298d2c2d2276c08130b51a6a37efe29019e3316b0cea3

    SHA512

    eb3df082515361bc79a3a867320171c9259c6325ed0bd8ec136c53caa282e483f598ead319fbf411eb08b7e5d5d47bb9311b8a7dfe1b673556247d36eb554ab6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i55153703.exe

    Filesize

    371KB

    MD5

    aa9094ca97eb29b24d02062c5bf5b33f

    SHA1

    fee171ab94f21dc5a7b5189266cf529f12cb655c

    SHA256

    2af8582a05bf0dd5850cad1dd6af2d7012490a3da5507311785bebf8e4e63545

    SHA512

    805b89938836ad2f1a30ff036375193de9281cffb435acc5dd0d900a8406cf54f7b521cc0b2236c84950a4d1d8e555502f8b13d62162f911454af30e3797b627

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i55153703.exe

    Filesize

    371KB

    MD5

    aa9094ca97eb29b24d02062c5bf5b33f

    SHA1

    fee171ab94f21dc5a7b5189266cf529f12cb655c

    SHA256

    2af8582a05bf0dd5850cad1dd6af2d7012490a3da5507311785bebf8e4e63545

    SHA512

    805b89938836ad2f1a30ff036375193de9281cffb435acc5dd0d900a8406cf54f7b521cc0b2236c84950a4d1d8e555502f8b13d62162f911454af30e3797b627

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a02714934.exe

    Filesize

    169KB

    MD5

    7f2584b4bb84cfbe4faf5e97d0ef3cf0

    SHA1

    cb3df329707bb03e870e468115e5bc4a84a38c5e

    SHA256

    865b8cea97b2d3efb400772e056bec368270a5c2733224d3462e5a8fb9f3f4a1

    SHA512

    75dfc052fcd8c6d8418e24dae0bb22c9700b2db593453261e29f693c488718f654ca02c2ef181603fe3dd64f9ebd3e0cd07157b40a693265099db31177ee4ec7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a02714934.exe

    Filesize

    169KB

    MD5

    7f2584b4bb84cfbe4faf5e97d0ef3cf0

    SHA1

    cb3df329707bb03e870e468115e5bc4a84a38c5e

    SHA256

    865b8cea97b2d3efb400772e056bec368270a5c2733224d3462e5a8fb9f3f4a1

    SHA512

    75dfc052fcd8c6d8418e24dae0bb22c9700b2db593453261e29f693c488718f654ca02c2ef181603fe3dd64f9ebd3e0cd07157b40a693265099db31177ee4ec7

  • memory/776-104-0x0000000000300000-0x0000000000330000-memory.dmp

    Filesize

    192KB

  • memory/776-105-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/776-106-0x0000000004B40000-0x0000000004B80000-memory.dmp

    Filesize

    256KB

  • memory/776-107-0x0000000004B40000-0x0000000004B80000-memory.dmp

    Filesize

    256KB