Analysis

  • max time kernel
    129s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:54

General

  • Target

    513d7e79ae99396b9d8a79f1af172929a020785510ab876afb0c25a547533354.exe

  • Size

    1.5MB

  • MD5

    ada40c4d94d6bf556255651b5ce72f7f

  • SHA1

    2da79c523cab8a492434f7af0783b49fed3a859e

  • SHA256

    513d7e79ae99396b9d8a79f1af172929a020785510ab876afb0c25a547533354

  • SHA512

    5b4ba6d9f5f6b8cfa18020b431feacbe11522419ccee5a6b55ba8726dad82800dd291255f30be04dd2e0790c21166fa80401437dbb626b89f355604365801101

  • SSDEEP

    24576:0y0NCFn7B0s0+VrbjML/Sv9Nd6T0hSnlvDWF9dJSG/i/Nk8n0AaZPGD/ytJy:D0wNVtDMy9Nd6AhSnlvDWhTaFk80AaZL

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\513d7e79ae99396b9d8a79f1af172929a020785510ab876afb0c25a547533354.exe
    "C:\Users\Admin\AppData\Local\Temp\513d7e79ae99396b9d8a79f1af172929a020785510ab876afb0c25a547533354.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i16634946.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i16634946.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95401095.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95401095.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i02940512.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i02940512.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1500
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i79756075.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i79756075.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:432
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a69126310.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a69126310.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1632

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i16634946.exe

          Filesize

          1.3MB

          MD5

          7157ff4c39060e7d45fcd4189c3c738c

          SHA1

          0c8f0dea920699e66caf939b58592141a0efd5c5

          SHA256

          ae2273dba5a7210631b427b0ef59bbb2c8dcbc94e245ebbb8c7ef8ddb3330aab

          SHA512

          076bf36600f5e92e284e1e062c329a285e4a99b97ca02b265d9410d706180aecc0db0a1733df2c9304d3e51dff5f71e4d4c59583f01e3c06dbe84de28f325813

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i16634946.exe

          Filesize

          1.3MB

          MD5

          7157ff4c39060e7d45fcd4189c3c738c

          SHA1

          0c8f0dea920699e66caf939b58592141a0efd5c5

          SHA256

          ae2273dba5a7210631b427b0ef59bbb2c8dcbc94e245ebbb8c7ef8ddb3330aab

          SHA512

          076bf36600f5e92e284e1e062c329a285e4a99b97ca02b265d9410d706180aecc0db0a1733df2c9304d3e51dff5f71e4d4c59583f01e3c06dbe84de28f325813

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95401095.exe

          Filesize

          1015KB

          MD5

          feb042ba0bc14b56edb7db4040ddd614

          SHA1

          0ebc8de6fe4ab6b4c482bf187e39fc80a805f70b

          SHA256

          909a41ef5303627afd2752cc940c253954e4ec327ef724014973e5f55a7ea5d2

          SHA512

          145102c5eed8439fa9d2c05fadd48f5de4b87dd25c6cebaab8c5dbeeebb844cab22b5694bba510ec884d34ab7994a0f2fbed3f560555f3562d6f247912704ffb

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i95401095.exe

          Filesize

          1015KB

          MD5

          feb042ba0bc14b56edb7db4040ddd614

          SHA1

          0ebc8de6fe4ab6b4c482bf187e39fc80a805f70b

          SHA256

          909a41ef5303627afd2752cc940c253954e4ec327ef724014973e5f55a7ea5d2

          SHA512

          145102c5eed8439fa9d2c05fadd48f5de4b87dd25c6cebaab8c5dbeeebb844cab22b5694bba510ec884d34ab7994a0f2fbed3f560555f3562d6f247912704ffb

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i02940512.exe

          Filesize

          843KB

          MD5

          32dc14aea1bcd69f583a8357fe5f23e1

          SHA1

          72bd42420378766e80557fa1f47f4ce1c9a2ab71

          SHA256

          339bc9c4b63cb4f170e3d15e49a663bc806375b1099d7d2d9c03f4dff0e96702

          SHA512

          ed1660ddd205b4e3223100aa2c75dd535694c8df8727c9f7f411686616dad48dff8826437239bfb077691c0ada5fff7c62ef545004bed2eaa13d371a4ab2d61e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i02940512.exe

          Filesize

          843KB

          MD5

          32dc14aea1bcd69f583a8357fe5f23e1

          SHA1

          72bd42420378766e80557fa1f47f4ce1c9a2ab71

          SHA256

          339bc9c4b63cb4f170e3d15e49a663bc806375b1099d7d2d9c03f4dff0e96702

          SHA512

          ed1660ddd205b4e3223100aa2c75dd535694c8df8727c9f7f411686616dad48dff8826437239bfb077691c0ada5fff7c62ef545004bed2eaa13d371a4ab2d61e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i79756075.exe

          Filesize

          371KB

          MD5

          31687389a4da0964d36edd2c59330de5

          SHA1

          d919bb7ceb581ad97eb6ed3d5ea627304db8a57a

          SHA256

          bdb271b55427e0dedba7a8af8b68e052e4c1f73470e8e52c5e20bb424d0bc0bf

          SHA512

          addc4e0295c7985ef1f5bcaefa69257bd5c4d16aa658a86e50dc9611cf71955a029d3df9cd5c79a4e515c348ed54609c5a293945c6c226ae6e435c6ec3bc9755

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i79756075.exe

          Filesize

          371KB

          MD5

          31687389a4da0964d36edd2c59330de5

          SHA1

          d919bb7ceb581ad97eb6ed3d5ea627304db8a57a

          SHA256

          bdb271b55427e0dedba7a8af8b68e052e4c1f73470e8e52c5e20bb424d0bc0bf

          SHA512

          addc4e0295c7985ef1f5bcaefa69257bd5c4d16aa658a86e50dc9611cf71955a029d3df9cd5c79a4e515c348ed54609c5a293945c6c226ae6e435c6ec3bc9755

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a69126310.exe

          Filesize

          169KB

          MD5

          7bc6df1685c63619877c69f79cf10b04

          SHA1

          e082617aa228afc9e7fa6a931d7830c541afae7b

          SHA256

          c516b00eed206614c54469a17962ead781f64284b8f64f09497c8dad4596ac3a

          SHA512

          5b194e3170d61e079e34a31f519624f421fe5a517d6fab7d6f393c0d9eb4644419a564525bde31a23221b041be26802b654389d1c281bf6c4a46fa5f3c9c84fb

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a69126310.exe

          Filesize

          169KB

          MD5

          7bc6df1685c63619877c69f79cf10b04

          SHA1

          e082617aa228afc9e7fa6a931d7830c541afae7b

          SHA256

          c516b00eed206614c54469a17962ead781f64284b8f64f09497c8dad4596ac3a

          SHA512

          5b194e3170d61e079e34a31f519624f421fe5a517d6fab7d6f393c0d9eb4644419a564525bde31a23221b041be26802b654389d1c281bf6c4a46fa5f3c9c84fb

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i16634946.exe

          Filesize

          1.3MB

          MD5

          7157ff4c39060e7d45fcd4189c3c738c

          SHA1

          0c8f0dea920699e66caf939b58592141a0efd5c5

          SHA256

          ae2273dba5a7210631b427b0ef59bbb2c8dcbc94e245ebbb8c7ef8ddb3330aab

          SHA512

          076bf36600f5e92e284e1e062c329a285e4a99b97ca02b265d9410d706180aecc0db0a1733df2c9304d3e51dff5f71e4d4c59583f01e3c06dbe84de28f325813

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i16634946.exe

          Filesize

          1.3MB

          MD5

          7157ff4c39060e7d45fcd4189c3c738c

          SHA1

          0c8f0dea920699e66caf939b58592141a0efd5c5

          SHA256

          ae2273dba5a7210631b427b0ef59bbb2c8dcbc94e245ebbb8c7ef8ddb3330aab

          SHA512

          076bf36600f5e92e284e1e062c329a285e4a99b97ca02b265d9410d706180aecc0db0a1733df2c9304d3e51dff5f71e4d4c59583f01e3c06dbe84de28f325813

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i95401095.exe

          Filesize

          1015KB

          MD5

          feb042ba0bc14b56edb7db4040ddd614

          SHA1

          0ebc8de6fe4ab6b4c482bf187e39fc80a805f70b

          SHA256

          909a41ef5303627afd2752cc940c253954e4ec327ef724014973e5f55a7ea5d2

          SHA512

          145102c5eed8439fa9d2c05fadd48f5de4b87dd25c6cebaab8c5dbeeebb844cab22b5694bba510ec884d34ab7994a0f2fbed3f560555f3562d6f247912704ffb

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i95401095.exe

          Filesize

          1015KB

          MD5

          feb042ba0bc14b56edb7db4040ddd614

          SHA1

          0ebc8de6fe4ab6b4c482bf187e39fc80a805f70b

          SHA256

          909a41ef5303627afd2752cc940c253954e4ec327ef724014973e5f55a7ea5d2

          SHA512

          145102c5eed8439fa9d2c05fadd48f5de4b87dd25c6cebaab8c5dbeeebb844cab22b5694bba510ec884d34ab7994a0f2fbed3f560555f3562d6f247912704ffb

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i02940512.exe

          Filesize

          843KB

          MD5

          32dc14aea1bcd69f583a8357fe5f23e1

          SHA1

          72bd42420378766e80557fa1f47f4ce1c9a2ab71

          SHA256

          339bc9c4b63cb4f170e3d15e49a663bc806375b1099d7d2d9c03f4dff0e96702

          SHA512

          ed1660ddd205b4e3223100aa2c75dd535694c8df8727c9f7f411686616dad48dff8826437239bfb077691c0ada5fff7c62ef545004bed2eaa13d371a4ab2d61e

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i02940512.exe

          Filesize

          843KB

          MD5

          32dc14aea1bcd69f583a8357fe5f23e1

          SHA1

          72bd42420378766e80557fa1f47f4ce1c9a2ab71

          SHA256

          339bc9c4b63cb4f170e3d15e49a663bc806375b1099d7d2d9c03f4dff0e96702

          SHA512

          ed1660ddd205b4e3223100aa2c75dd535694c8df8727c9f7f411686616dad48dff8826437239bfb077691c0ada5fff7c62ef545004bed2eaa13d371a4ab2d61e

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i79756075.exe

          Filesize

          371KB

          MD5

          31687389a4da0964d36edd2c59330de5

          SHA1

          d919bb7ceb581ad97eb6ed3d5ea627304db8a57a

          SHA256

          bdb271b55427e0dedba7a8af8b68e052e4c1f73470e8e52c5e20bb424d0bc0bf

          SHA512

          addc4e0295c7985ef1f5bcaefa69257bd5c4d16aa658a86e50dc9611cf71955a029d3df9cd5c79a4e515c348ed54609c5a293945c6c226ae6e435c6ec3bc9755

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i79756075.exe

          Filesize

          371KB

          MD5

          31687389a4da0964d36edd2c59330de5

          SHA1

          d919bb7ceb581ad97eb6ed3d5ea627304db8a57a

          SHA256

          bdb271b55427e0dedba7a8af8b68e052e4c1f73470e8e52c5e20bb424d0bc0bf

          SHA512

          addc4e0295c7985ef1f5bcaefa69257bd5c4d16aa658a86e50dc9611cf71955a029d3df9cd5c79a4e515c348ed54609c5a293945c6c226ae6e435c6ec3bc9755

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a69126310.exe

          Filesize

          169KB

          MD5

          7bc6df1685c63619877c69f79cf10b04

          SHA1

          e082617aa228afc9e7fa6a931d7830c541afae7b

          SHA256

          c516b00eed206614c54469a17962ead781f64284b8f64f09497c8dad4596ac3a

          SHA512

          5b194e3170d61e079e34a31f519624f421fe5a517d6fab7d6f393c0d9eb4644419a564525bde31a23221b041be26802b654389d1c281bf6c4a46fa5f3c9c84fb

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a69126310.exe

          Filesize

          169KB

          MD5

          7bc6df1685c63619877c69f79cf10b04

          SHA1

          e082617aa228afc9e7fa6a931d7830c541afae7b

          SHA256

          c516b00eed206614c54469a17962ead781f64284b8f64f09497c8dad4596ac3a

          SHA512

          5b194e3170d61e079e34a31f519624f421fe5a517d6fab7d6f393c0d9eb4644419a564525bde31a23221b041be26802b654389d1c281bf6c4a46fa5f3c9c84fb

        • memory/1632-104-0x00000000011D0000-0x0000000001200000-memory.dmp

          Filesize

          192KB

        • memory/1632-105-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/1632-106-0x0000000000760000-0x00000000007A0000-memory.dmp

          Filesize

          256KB

        • memory/1632-107-0x0000000000760000-0x00000000007A0000-memory.dmp

          Filesize

          256KB