Analysis

  • max time kernel
    175s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:18

General

  • Target

    66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe

  • Size

    642KB

  • MD5

    132f1f66a9ad40e725a298dfaa0d98cd

  • SHA1

    9c432aa16a648795ece63456fe2dc493a5d2a759

  • SHA256

    66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96

  • SHA512

    7a866160c3364871baec5cd544a0831b24757125ffb1d203550290443753ba82a2a751c917b5377a814efe5a5a6fdf8b83033725da51dac174386bf61da652bc

  • SSDEEP

    12288:4MrLy90DFr72FdV8HIgPhZsnP8qqYVO1mkNucbzuOpxhNbpj7gO:DyW/2CIOUnP8aV/k9mOpxzbFgO

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe
    "C:\Users\Admin\AppData\Local\Temp\66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exe

    Filesize

    383KB

    MD5

    bf741a5bee2754e4c0319b941b4c2ed6

    SHA1

    9342fac83c75dc5038438e2f5bd35d73900bb87a

    SHA256

    8f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f

    SHA512

    fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exe

    Filesize

    383KB

    MD5

    bf741a5bee2754e4c0319b941b4c2ed6

    SHA1

    9342fac83c75dc5038438e2f5bd35d73900bb87a

    SHA256

    8f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f

    SHA512

    fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exe

    Filesize

    168KB

    MD5

    fc6cde39444c185caf24e4ede8d4fe6b

    SHA1

    cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e

    SHA256

    7c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f

    SHA512

    8ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exe

    Filesize

    168KB

    MD5

    fc6cde39444c185caf24e4ede8d4fe6b

    SHA1

    cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e

    SHA256

    7c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f

    SHA512

    8ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exe

    Filesize

    383KB

    MD5

    bf741a5bee2754e4c0319b941b4c2ed6

    SHA1

    9342fac83c75dc5038438e2f5bd35d73900bb87a

    SHA256

    8f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f

    SHA512

    fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exe

    Filesize

    383KB

    MD5

    bf741a5bee2754e4c0319b941b4c2ed6

    SHA1

    9342fac83c75dc5038438e2f5bd35d73900bb87a

    SHA256

    8f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f

    SHA512

    fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exe

    Filesize

    168KB

    MD5

    fc6cde39444c185caf24e4ede8d4fe6b

    SHA1

    cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e

    SHA256

    7c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f

    SHA512

    8ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exe

    Filesize

    168KB

    MD5

    fc6cde39444c185caf24e4ede8d4fe6b

    SHA1

    cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e

    SHA256

    7c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f

    SHA512

    8ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0

  • memory/672-74-0x0000000001110000-0x0000000001140000-memory.dmp

    Filesize

    192KB

  • memory/672-75-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/672-76-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/672-77-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB