Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 18:51

General

  • Target

    a714ae161319bab7c2b8fa0324e5d581ff2566ca47d6997de4ba99afff9f9343.exe

  • Size

    1.5MB

  • MD5

    5786f8c92a6d7d4f32809152fc022605

  • SHA1

    36de3ffa3fbf932a8b412726e049ac9cbd82cb29

  • SHA256

    a714ae161319bab7c2b8fa0324e5d581ff2566ca47d6997de4ba99afff9f9343

  • SHA512

    1a9222edfe2077ad59992fc4775895d3a98bb6e2ac86645b428d8463b8d85db3083c67c1a3fd19bec8f05bc373a31f7949400315af0686c9522b944b30b3d171

  • SSDEEP

    24576:iykOa284IijsbgcikGN9bJ1w9zAj+ciYRsGL+fDQkFNKBMT4qQn2qckR+DD4CfR:J/aH49jsbVs/GrmTKLQkLSMT2n2qjR+5

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a714ae161319bab7c2b8fa0324e5d581ff2566ca47d6997de4ba99afff9f9343.exe
    "C:\Users\Admin\AppData\Local\Temp\a714ae161319bab7c2b8fa0324e5d581ff2566ca47d6997de4ba99afff9f9343.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i32835088.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i32835088.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95486578.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95486578.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28073277.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28073277.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i61756428.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i61756428.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1472
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a03346381.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a03346381.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:812

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i32835088.exe

          Filesize

          1.3MB

          MD5

          5bcf77c0980d038883c5fb184c170cb6

          SHA1

          f1829d2f4dc1480dae6475ad500f91f44c30fbd4

          SHA256

          d4eb480a5a1513c31f0fda8b3dbe5c27282697289ee98d712e9747fdf49ef38b

          SHA512

          12bd8cb4b529b63e8752706d5c8cb981188db9fe7f7d8d8111322486b99b4d08197a32c6d657e6105b77d9ffb70d901c177e36e42680f2a04c9c65cc10d65515

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i32835088.exe

          Filesize

          1.3MB

          MD5

          5bcf77c0980d038883c5fb184c170cb6

          SHA1

          f1829d2f4dc1480dae6475ad500f91f44c30fbd4

          SHA256

          d4eb480a5a1513c31f0fda8b3dbe5c27282697289ee98d712e9747fdf49ef38b

          SHA512

          12bd8cb4b529b63e8752706d5c8cb981188db9fe7f7d8d8111322486b99b4d08197a32c6d657e6105b77d9ffb70d901c177e36e42680f2a04c9c65cc10d65515

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95486578.exe

          Filesize

          1014KB

          MD5

          77ef1489466e80b47233347a8788fa2d

          SHA1

          6035401d9fe36bbd0c4f20ce337dcb5c09d23a07

          SHA256

          cd30f5ce4b60da55ba3de5d92923997d4dac918672c80765dbe6c46e41b17460

          SHA512

          854f5773186d38e4b32de4657edb3e541fcda2e2e380c45dbde8c9790001b9f4595209958d204fe3e283ddff0da6c90b9cae64253761b9bab8a9e296128a08e0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95486578.exe

          Filesize

          1014KB

          MD5

          77ef1489466e80b47233347a8788fa2d

          SHA1

          6035401d9fe36bbd0c4f20ce337dcb5c09d23a07

          SHA256

          cd30f5ce4b60da55ba3de5d92923997d4dac918672c80765dbe6c46e41b17460

          SHA512

          854f5773186d38e4b32de4657edb3e541fcda2e2e380c45dbde8c9790001b9f4595209958d204fe3e283ddff0da6c90b9cae64253761b9bab8a9e296128a08e0

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28073277.exe

          Filesize

          843KB

          MD5

          bb757be0dbe563d5cc1d17e6452b0dc0

          SHA1

          d2fa08838f6795b73383f7c75e8d26ddc8d94e70

          SHA256

          39666f5ca49de43d948aa95b6e6a3ae26d579fdbc7e9adb1964d2ce03736db7e

          SHA512

          a042614955c3ee78787a1b17f621c58b8f77a779bc3f018033588ccde7939d56dd89fd146089dfcd81f45ec9838318efbeb58712052eb9688e403c0e258a1b00

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28073277.exe

          Filesize

          843KB

          MD5

          bb757be0dbe563d5cc1d17e6452b0dc0

          SHA1

          d2fa08838f6795b73383f7c75e8d26ddc8d94e70

          SHA256

          39666f5ca49de43d948aa95b6e6a3ae26d579fdbc7e9adb1964d2ce03736db7e

          SHA512

          a042614955c3ee78787a1b17f621c58b8f77a779bc3f018033588ccde7939d56dd89fd146089dfcd81f45ec9838318efbeb58712052eb9688e403c0e258a1b00

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i61756428.exe

          Filesize

          371KB

          MD5

          e9ccce1bddae5baf46fa72cac0a7fb9c

          SHA1

          f5a96332fff358b6c3b842d1ad7ac5ca10b1ace6

          SHA256

          a53decad989d60fde02694bdc5618ef8619c66bbeda8f215fc559c3165296605

          SHA512

          9345eab4ed0dd3845b4b18e74e42d3193ff8417fa7cbfd7caaba81bd4ba0ca75895ffbbef9a9a7efc731764839b088789d75022410202f9dfc1e41086db4e687

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i61756428.exe

          Filesize

          371KB

          MD5

          e9ccce1bddae5baf46fa72cac0a7fb9c

          SHA1

          f5a96332fff358b6c3b842d1ad7ac5ca10b1ace6

          SHA256

          a53decad989d60fde02694bdc5618ef8619c66bbeda8f215fc559c3165296605

          SHA512

          9345eab4ed0dd3845b4b18e74e42d3193ff8417fa7cbfd7caaba81bd4ba0ca75895ffbbef9a9a7efc731764839b088789d75022410202f9dfc1e41086db4e687

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a03346381.exe

          Filesize

          169KB

          MD5

          5f0af4353146e0737531d8dd25f5d82d

          SHA1

          92edca4acaf7b982b128305e7dd7e4ccbee55f7b

          SHA256

          9313c3091f144b72da31529dc2fe7493981b244b4479eba9258ba1e584489b5d

          SHA512

          ed2dd653d9585d62bdde4809fe22912f9b01286a8a8a8d9fafafa850120bd4c353ce78eef236be7ccbfc78b93f7fd8a51a15df42dc39816805d54e6a0047b893

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a03346381.exe

          Filesize

          169KB

          MD5

          5f0af4353146e0737531d8dd25f5d82d

          SHA1

          92edca4acaf7b982b128305e7dd7e4ccbee55f7b

          SHA256

          9313c3091f144b72da31529dc2fe7493981b244b4479eba9258ba1e584489b5d

          SHA512

          ed2dd653d9585d62bdde4809fe22912f9b01286a8a8a8d9fafafa850120bd4c353ce78eef236be7ccbfc78b93f7fd8a51a15df42dc39816805d54e6a0047b893

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i32835088.exe

          Filesize

          1.3MB

          MD5

          5bcf77c0980d038883c5fb184c170cb6

          SHA1

          f1829d2f4dc1480dae6475ad500f91f44c30fbd4

          SHA256

          d4eb480a5a1513c31f0fda8b3dbe5c27282697289ee98d712e9747fdf49ef38b

          SHA512

          12bd8cb4b529b63e8752706d5c8cb981188db9fe7f7d8d8111322486b99b4d08197a32c6d657e6105b77d9ffb70d901c177e36e42680f2a04c9c65cc10d65515

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i32835088.exe

          Filesize

          1.3MB

          MD5

          5bcf77c0980d038883c5fb184c170cb6

          SHA1

          f1829d2f4dc1480dae6475ad500f91f44c30fbd4

          SHA256

          d4eb480a5a1513c31f0fda8b3dbe5c27282697289ee98d712e9747fdf49ef38b

          SHA512

          12bd8cb4b529b63e8752706d5c8cb981188db9fe7f7d8d8111322486b99b4d08197a32c6d657e6105b77d9ffb70d901c177e36e42680f2a04c9c65cc10d65515

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i95486578.exe

          Filesize

          1014KB

          MD5

          77ef1489466e80b47233347a8788fa2d

          SHA1

          6035401d9fe36bbd0c4f20ce337dcb5c09d23a07

          SHA256

          cd30f5ce4b60da55ba3de5d92923997d4dac918672c80765dbe6c46e41b17460

          SHA512

          854f5773186d38e4b32de4657edb3e541fcda2e2e380c45dbde8c9790001b9f4595209958d204fe3e283ddff0da6c90b9cae64253761b9bab8a9e296128a08e0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i95486578.exe

          Filesize

          1014KB

          MD5

          77ef1489466e80b47233347a8788fa2d

          SHA1

          6035401d9fe36bbd0c4f20ce337dcb5c09d23a07

          SHA256

          cd30f5ce4b60da55ba3de5d92923997d4dac918672c80765dbe6c46e41b17460

          SHA512

          854f5773186d38e4b32de4657edb3e541fcda2e2e380c45dbde8c9790001b9f4595209958d204fe3e283ddff0da6c90b9cae64253761b9bab8a9e296128a08e0

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i28073277.exe

          Filesize

          843KB

          MD5

          bb757be0dbe563d5cc1d17e6452b0dc0

          SHA1

          d2fa08838f6795b73383f7c75e8d26ddc8d94e70

          SHA256

          39666f5ca49de43d948aa95b6e6a3ae26d579fdbc7e9adb1964d2ce03736db7e

          SHA512

          a042614955c3ee78787a1b17f621c58b8f77a779bc3f018033588ccde7939d56dd89fd146089dfcd81f45ec9838318efbeb58712052eb9688e403c0e258a1b00

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i28073277.exe

          Filesize

          843KB

          MD5

          bb757be0dbe563d5cc1d17e6452b0dc0

          SHA1

          d2fa08838f6795b73383f7c75e8d26ddc8d94e70

          SHA256

          39666f5ca49de43d948aa95b6e6a3ae26d579fdbc7e9adb1964d2ce03736db7e

          SHA512

          a042614955c3ee78787a1b17f621c58b8f77a779bc3f018033588ccde7939d56dd89fd146089dfcd81f45ec9838318efbeb58712052eb9688e403c0e258a1b00

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i61756428.exe

          Filesize

          371KB

          MD5

          e9ccce1bddae5baf46fa72cac0a7fb9c

          SHA1

          f5a96332fff358b6c3b842d1ad7ac5ca10b1ace6

          SHA256

          a53decad989d60fde02694bdc5618ef8619c66bbeda8f215fc559c3165296605

          SHA512

          9345eab4ed0dd3845b4b18e74e42d3193ff8417fa7cbfd7caaba81bd4ba0ca75895ffbbef9a9a7efc731764839b088789d75022410202f9dfc1e41086db4e687

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i61756428.exe

          Filesize

          371KB

          MD5

          e9ccce1bddae5baf46fa72cac0a7fb9c

          SHA1

          f5a96332fff358b6c3b842d1ad7ac5ca10b1ace6

          SHA256

          a53decad989d60fde02694bdc5618ef8619c66bbeda8f215fc559c3165296605

          SHA512

          9345eab4ed0dd3845b4b18e74e42d3193ff8417fa7cbfd7caaba81bd4ba0ca75895ffbbef9a9a7efc731764839b088789d75022410202f9dfc1e41086db4e687

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a03346381.exe

          Filesize

          169KB

          MD5

          5f0af4353146e0737531d8dd25f5d82d

          SHA1

          92edca4acaf7b982b128305e7dd7e4ccbee55f7b

          SHA256

          9313c3091f144b72da31529dc2fe7493981b244b4479eba9258ba1e584489b5d

          SHA512

          ed2dd653d9585d62bdde4809fe22912f9b01286a8a8a8d9fafafa850120bd4c353ce78eef236be7ccbfc78b93f7fd8a51a15df42dc39816805d54e6a0047b893

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a03346381.exe

          Filesize

          169KB

          MD5

          5f0af4353146e0737531d8dd25f5d82d

          SHA1

          92edca4acaf7b982b128305e7dd7e4ccbee55f7b

          SHA256

          9313c3091f144b72da31529dc2fe7493981b244b4479eba9258ba1e584489b5d

          SHA512

          ed2dd653d9585d62bdde4809fe22912f9b01286a8a8a8d9fafafa850120bd4c353ce78eef236be7ccbfc78b93f7fd8a51a15df42dc39816805d54e6a0047b893

        • memory/812-104-0x0000000000FA0000-0x0000000000FD0000-memory.dmp

          Filesize

          192KB

        • memory/812-105-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB

        • memory/812-106-0x0000000004B90000-0x0000000004BD0000-memory.dmp

          Filesize

          256KB

        • memory/812-107-0x0000000004B90000-0x0000000004BD0000-memory.dmp

          Filesize

          256KB