Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:09

General

  • Target

    e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe

  • Size

    1.5MB

  • MD5

    924a443b45f37857dac34f1056951816

  • SHA1

    f55da1aaa0b4e6ea8e60a1fcf6393bbbf019c2eb

  • SHA256

    e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb

  • SHA512

    45e9b3d3e263e90358e980520dcbb201e30ab2bff221ff89416d831ce001f847922ce5535e72c8dd0a73d393102a7e8a37c2026c3182fa235855814ed4ddef33

  • SSDEEP

    24576:qytVTzzv/HVeEwJWmiWS180apXmZLUOhiSE/fAypdB3kFE+iQq/SGFeVuxI:xrvzvmbFp2ZLUyan1pdFZQq/SGFeVu

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe
    "C:\Users\Admin\AppData\Local\Temp\e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:944
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1536
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1496

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exe

          Filesize

          1.3MB

          MD5

          6c8c7e1794cada406a803cfeaf380e85

          SHA1

          39fb188dc2ea6196a9a684591d283b4bbe3f933b

          SHA256

          00f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53

          SHA512

          f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exe

          Filesize

          1.3MB

          MD5

          6c8c7e1794cada406a803cfeaf380e85

          SHA1

          39fb188dc2ea6196a9a684591d283b4bbe3f933b

          SHA256

          00f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53

          SHA512

          f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exe

          Filesize

          1015KB

          MD5

          498ed43d955ccbadf1b080f13398a801

          SHA1

          c56b640e243380525f33cd4aa6517fa0567e8050

          SHA256

          af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e

          SHA512

          92f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exe

          Filesize

          1015KB

          MD5

          498ed43d955ccbadf1b080f13398a801

          SHA1

          c56b640e243380525f33cd4aa6517fa0567e8050

          SHA256

          af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e

          SHA512

          92f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exe

          Filesize

          843KB

          MD5

          423bff3beca44b5da89f052fce3851cc

          SHA1

          d34d7fb0abc6d66d961fc6128d982a7eec693332

          SHA256

          bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9

          SHA512

          611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exe

          Filesize

          843KB

          MD5

          423bff3beca44b5da89f052fce3851cc

          SHA1

          d34d7fb0abc6d66d961fc6128d982a7eec693332

          SHA256

          bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9

          SHA512

          611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exe

          Filesize

          371KB

          MD5

          2f8d694329d848a4fd217e08a013fb31

          SHA1

          b130255327465ee99c5a5110c1c04756cf7f3b8a

          SHA256

          37202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526

          SHA512

          c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exe

          Filesize

          371KB

          MD5

          2f8d694329d848a4fd217e08a013fb31

          SHA1

          b130255327465ee99c5a5110c1c04756cf7f3b8a

          SHA256

          37202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526

          SHA512

          c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exe

          Filesize

          169KB

          MD5

          169549c977777cc55ce335e92d1d6d02

          SHA1

          2f5e83db6dafdcf5766a705918b9eae2d06d179c

          SHA256

          52f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c

          SHA512

          150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exe

          Filesize

          169KB

          MD5

          169549c977777cc55ce335e92d1d6d02

          SHA1

          2f5e83db6dafdcf5766a705918b9eae2d06d179c

          SHA256

          52f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c

          SHA512

          150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exe

          Filesize

          1.3MB

          MD5

          6c8c7e1794cada406a803cfeaf380e85

          SHA1

          39fb188dc2ea6196a9a684591d283b4bbe3f933b

          SHA256

          00f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53

          SHA512

          f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exe

          Filesize

          1.3MB

          MD5

          6c8c7e1794cada406a803cfeaf380e85

          SHA1

          39fb188dc2ea6196a9a684591d283b4bbe3f933b

          SHA256

          00f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53

          SHA512

          f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exe

          Filesize

          1015KB

          MD5

          498ed43d955ccbadf1b080f13398a801

          SHA1

          c56b640e243380525f33cd4aa6517fa0567e8050

          SHA256

          af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e

          SHA512

          92f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exe

          Filesize

          1015KB

          MD5

          498ed43d955ccbadf1b080f13398a801

          SHA1

          c56b640e243380525f33cd4aa6517fa0567e8050

          SHA256

          af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e

          SHA512

          92f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exe

          Filesize

          843KB

          MD5

          423bff3beca44b5da89f052fce3851cc

          SHA1

          d34d7fb0abc6d66d961fc6128d982a7eec693332

          SHA256

          bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9

          SHA512

          611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exe

          Filesize

          843KB

          MD5

          423bff3beca44b5da89f052fce3851cc

          SHA1

          d34d7fb0abc6d66d961fc6128d982a7eec693332

          SHA256

          bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9

          SHA512

          611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exe

          Filesize

          371KB

          MD5

          2f8d694329d848a4fd217e08a013fb31

          SHA1

          b130255327465ee99c5a5110c1c04756cf7f3b8a

          SHA256

          37202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526

          SHA512

          c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exe

          Filesize

          371KB

          MD5

          2f8d694329d848a4fd217e08a013fb31

          SHA1

          b130255327465ee99c5a5110c1c04756cf7f3b8a

          SHA256

          37202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526

          SHA512

          c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exe

          Filesize

          169KB

          MD5

          169549c977777cc55ce335e92d1d6d02

          SHA1

          2f5e83db6dafdcf5766a705918b9eae2d06d179c

          SHA256

          52f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c

          SHA512

          150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exe

          Filesize

          169KB

          MD5

          169549c977777cc55ce335e92d1d6d02

          SHA1

          2f5e83db6dafdcf5766a705918b9eae2d06d179c

          SHA256

          52f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c

          SHA512

          150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0

        • memory/1496-104-0x0000000000AF0000-0x0000000000B20000-memory.dmp

          Filesize

          192KB

        • memory/1496-105-0x0000000000440000-0x0000000000446000-memory.dmp

          Filesize

          24KB

        • memory/1496-106-0x0000000002480000-0x00000000024C0000-memory.dmp

          Filesize

          256KB

        • memory/1496-107-0x0000000002480000-0x00000000024C0000-memory.dmp

          Filesize

          256KB