Analysis

  • max time kernel
    288s
  • max time network
    405s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 20:37

General

  • Target

    fbd9ec03aa2f54ef82e274ad36ebc2bd1f7dc1703d94f9a7f0c4dce8d5d2f24d.exe

  • Size

    643KB

  • MD5

    4208d027ddf5f12dcd187fedac78f4ec

  • SHA1

    8560404b5258380600d33a5df5ab27411538f500

  • SHA256

    fbd9ec03aa2f54ef82e274ad36ebc2bd1f7dc1703d94f9a7f0c4dce8d5d2f24d

  • SHA512

    c2003275d7f432dcafd1d86e4361da1f5c0118bb5efb35ac7cf145243e960c6506d6f768572e697acfe7f39b33ca270257e87761fabd18ad5fa73e9c5359a5da

  • SSDEEP

    12288:8MrRy906zM2yYA3D/fi3EqQEOmncX2ifGkyyky7w1mxZ:1yjMESJfGGky/Z

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • Detects Redline Stealer samples 2 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbd9ec03aa2f54ef82e274ad36ebc2bd1f7dc1703d94f9a7f0c4dce8d5d2f24d.exe
    "C:\Users\Admin\AppData\Local\Temp\fbd9ec03aa2f54ef82e274ad36ebc2bd1f7dc1703d94f9a7f0c4dce8d5d2f24d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1668713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1668713.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0388222.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0388222.exe
        3⤵
        • Executes dropped EXE
        PID:560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1668713.exe

    Filesize

    383KB

    MD5

    b9bbb1369f5cc3ef01b96015ff230d3a

    SHA1

    18a974606e21b6d727cef7869fff3a67fa60492d

    SHA256

    f88bd129dfe64e1a56518bc21fc884c102af965c10c1f9477dab553fdf80885a

    SHA512

    6306f510b7cf830794dcbaee2407386081c2932d8b9aa6340d09beeb0e5dc82744a1cd7892bfd09a4c35474af337a00a7a55422193981927e21ce75346f3c99d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1668713.exe

    Filesize

    383KB

    MD5

    b9bbb1369f5cc3ef01b96015ff230d3a

    SHA1

    18a974606e21b6d727cef7869fff3a67fa60492d

    SHA256

    f88bd129dfe64e1a56518bc21fc884c102af965c10c1f9477dab553fdf80885a

    SHA512

    6306f510b7cf830794dcbaee2407386081c2932d8b9aa6340d09beeb0e5dc82744a1cd7892bfd09a4c35474af337a00a7a55422193981927e21ce75346f3c99d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0388222.exe

    Filesize

    168KB

    MD5

    1f86ddcddfe0771846550fc7ba1b22ec

    SHA1

    dfdee3f353731bdad4a16ea2125b7a4f59e85a93

    SHA256

    1616b1457cc848e40cfe0102161097423eeea4f6adbd9d941ffd2d9f92ec965c

    SHA512

    bd066a931d036c0aceb1defdd29d875f77628510b91481b76d3f4c38fbc237745cd46f4cf0a4fb2392bf7c9eafdc12a98f91ece9050eec195cd4caaeddc8eae7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0388222.exe

    Filesize

    168KB

    MD5

    1f86ddcddfe0771846550fc7ba1b22ec

    SHA1

    dfdee3f353731bdad4a16ea2125b7a4f59e85a93

    SHA256

    1616b1457cc848e40cfe0102161097423eeea4f6adbd9d941ffd2d9f92ec965c

    SHA512

    bd066a931d036c0aceb1defdd29d875f77628510b91481b76d3f4c38fbc237745cd46f4cf0a4fb2392bf7c9eafdc12a98f91ece9050eec195cd4caaeddc8eae7

  • memory/560-147-0x0000000000E80000-0x0000000000EB0000-memory.dmp

    Filesize

    192KB

  • memory/560-148-0x0000000005D80000-0x0000000006398000-memory.dmp

    Filesize

    6.1MB

  • memory/560-149-0x0000000005890000-0x000000000599A000-memory.dmp

    Filesize

    1.0MB

  • memory/560-150-0x00000000057C0000-0x00000000057D2000-memory.dmp

    Filesize

    72KB

  • memory/560-151-0x0000000005820000-0x000000000585C000-memory.dmp

    Filesize

    240KB

  • memory/560-152-0x00000000030C0000-0x00000000030D0000-memory.dmp

    Filesize

    64KB

  • memory/560-153-0x00000000030C0000-0x00000000030D0000-memory.dmp

    Filesize

    64KB

  • memory/560-154-0x00000000014B0000-0x0000000001526000-memory.dmp

    Filesize

    472KB

  • memory/560-155-0x00000000059F0000-0x0000000005A82000-memory.dmp

    Filesize

    584KB

  • memory/560-156-0x0000000006E40000-0x00000000073E4000-memory.dmp

    Filesize

    5.6MB

  • memory/560-157-0x0000000005B00000-0x0000000005B66000-memory.dmp

    Filesize

    408KB