Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:15

General

  • Target

    04d91cf96bb749f4c39e4f787b52f5dca1e7699fac03d0a45fe870ba9eef5bb6.bin.exe

  • Size

    1.5MB

  • MD5

    b75b3b1173613e44ecd357a7b563ab5c

  • SHA1

    9173d70646ae7716f13271ae54635173c77a9597

  • SHA256

    04d91cf96bb749f4c39e4f787b52f5dca1e7699fac03d0a45fe870ba9eef5bb6

  • SHA512

    e4c7bf1dd7bb987daaea27d11d0b40e85a27bf76ed6b6c888cc84edf11aadca59ae95b95a0060ce957bb80400f25467824c8c99f64f5b5a24f55c3bc47d0465a

  • SSDEEP

    24576:qytVXlUSN4O0Eh7llP8zCxWkOkTbbS0/rODwWQxjl2mO5HVerXl/TsKOAM:xt5l541E5DMkvhDuwWQ2mK1erW7A

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04d91cf96bb749f4c39e4f787b52f5dca1e7699fac03d0a45fe870ba9eef5bb6.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\04d91cf96bb749f4c39e4f787b52f5dca1e7699fac03d0a45fe870ba9eef5bb6.bin.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i52175973.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i52175973.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i53705109.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i53705109.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87709883.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87709883.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i17519398.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i17519398.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1536
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a97890452.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a97890452.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i52175973.exe

    Filesize

    1.3MB

    MD5

    2043c911f183f00dadd9013087bb083b

    SHA1

    4db7eb9f3520cad14c0e70bed3c51399f9d13d34

    SHA256

    abca67e5dfc2ab3c310176cbde6ba777ccd67be577234740008d5eb171f8486e

    SHA512

    1cc9cdb0a8b217370e6cd596cea230aac8d0b78d9d0fc52689f85fc829188e564df7a55549e9c88a98fa5fa9f01228ea8c7d9de075966c13c716f0035c07d7bd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i52175973.exe

    Filesize

    1.3MB

    MD5

    2043c911f183f00dadd9013087bb083b

    SHA1

    4db7eb9f3520cad14c0e70bed3c51399f9d13d34

    SHA256

    abca67e5dfc2ab3c310176cbde6ba777ccd67be577234740008d5eb171f8486e

    SHA512

    1cc9cdb0a8b217370e6cd596cea230aac8d0b78d9d0fc52689f85fc829188e564df7a55549e9c88a98fa5fa9f01228ea8c7d9de075966c13c716f0035c07d7bd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i53705109.exe

    Filesize

    1014KB

    MD5

    b9e55ffcec5185e5799bd0184496fbf5

    SHA1

    13d486997d8f4cdfe87924826800115e966674e7

    SHA256

    94976da79e0e3035ee19cf4d89ae5e2fd7959e743554a010e11e3b07c4cae827

    SHA512

    99b2ab0a4ce0793a86540cc3199b436f4251ea29ba137c956e6898e6058b24e8689cf4dc928ede49bd034b4ef4629d6984e3c8006444dacd674fc41e8a9f5a6f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i53705109.exe

    Filesize

    1014KB

    MD5

    b9e55ffcec5185e5799bd0184496fbf5

    SHA1

    13d486997d8f4cdfe87924826800115e966674e7

    SHA256

    94976da79e0e3035ee19cf4d89ae5e2fd7959e743554a010e11e3b07c4cae827

    SHA512

    99b2ab0a4ce0793a86540cc3199b436f4251ea29ba137c956e6898e6058b24e8689cf4dc928ede49bd034b4ef4629d6984e3c8006444dacd674fc41e8a9f5a6f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87709883.exe

    Filesize

    843KB

    MD5

    bdb7d31c02950ad69665aa0740466278

    SHA1

    ab245763739b25a1372c6c828560a3c557cfb769

    SHA256

    cdb4ec5fb42faabe02df53e223720b806db231917441ee60b2d79cb790fb4773

    SHA512

    2e62a2bf448174617a81649b9375b938e4dcb3961339ef2ecafbdb26f355df1f767738f5da9b28b76feabd66bd1bc488c1db625be5ccfd6f298785081d68fffb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87709883.exe

    Filesize

    843KB

    MD5

    bdb7d31c02950ad69665aa0740466278

    SHA1

    ab245763739b25a1372c6c828560a3c557cfb769

    SHA256

    cdb4ec5fb42faabe02df53e223720b806db231917441ee60b2d79cb790fb4773

    SHA512

    2e62a2bf448174617a81649b9375b938e4dcb3961339ef2ecafbdb26f355df1f767738f5da9b28b76feabd66bd1bc488c1db625be5ccfd6f298785081d68fffb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i17519398.exe

    Filesize

    371KB

    MD5

    58195536021ac6dbac8dececbef73bcf

    SHA1

    fe9897aabdad201b9c016389e0d6633a4fa71eb1

    SHA256

    63565ea0aeb94e8c7f3944d9c01f51198e1644e185983779cf3ebed188738de4

    SHA512

    2e43e465eec9b14c2c34a2a3800745ffec9158f88ad8debee775ae7b62bff782ffb3452dd2f0acffaae2d33e24869f6f0251cd550a4f06ed75de9350663625b4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i17519398.exe

    Filesize

    371KB

    MD5

    58195536021ac6dbac8dececbef73bcf

    SHA1

    fe9897aabdad201b9c016389e0d6633a4fa71eb1

    SHA256

    63565ea0aeb94e8c7f3944d9c01f51198e1644e185983779cf3ebed188738de4

    SHA512

    2e43e465eec9b14c2c34a2a3800745ffec9158f88ad8debee775ae7b62bff782ffb3452dd2f0acffaae2d33e24869f6f0251cd550a4f06ed75de9350663625b4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a97890452.exe

    Filesize

    169KB

    MD5

    856ccbdebece9765c9ebd7bbfc80b43e

    SHA1

    7cf3bf7384c2a8de67f04ba51b9f985412e1e878

    SHA256

    ff10e8f626d23a23b6e9b9847c24490954dfaebbd1543e40506ab92b0a32d0a8

    SHA512

    bd4614ba14e6b5e31be9f5cb339e79a887fcdb22cc268908c0ad62c4e27c48d0c7c8e8ea0cb3b8fb2f4b2dafdc1e348b94ce7ab8fe16bb8d3ec8293ef24e7535

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a97890452.exe

    Filesize

    169KB

    MD5

    856ccbdebece9765c9ebd7bbfc80b43e

    SHA1

    7cf3bf7384c2a8de67f04ba51b9f985412e1e878

    SHA256

    ff10e8f626d23a23b6e9b9847c24490954dfaebbd1543e40506ab92b0a32d0a8

    SHA512

    bd4614ba14e6b5e31be9f5cb339e79a887fcdb22cc268908c0ad62c4e27c48d0c7c8e8ea0cb3b8fb2f4b2dafdc1e348b94ce7ab8fe16bb8d3ec8293ef24e7535

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i52175973.exe

    Filesize

    1.3MB

    MD5

    2043c911f183f00dadd9013087bb083b

    SHA1

    4db7eb9f3520cad14c0e70bed3c51399f9d13d34

    SHA256

    abca67e5dfc2ab3c310176cbde6ba777ccd67be577234740008d5eb171f8486e

    SHA512

    1cc9cdb0a8b217370e6cd596cea230aac8d0b78d9d0fc52689f85fc829188e564df7a55549e9c88a98fa5fa9f01228ea8c7d9de075966c13c716f0035c07d7bd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i52175973.exe

    Filesize

    1.3MB

    MD5

    2043c911f183f00dadd9013087bb083b

    SHA1

    4db7eb9f3520cad14c0e70bed3c51399f9d13d34

    SHA256

    abca67e5dfc2ab3c310176cbde6ba777ccd67be577234740008d5eb171f8486e

    SHA512

    1cc9cdb0a8b217370e6cd596cea230aac8d0b78d9d0fc52689f85fc829188e564df7a55549e9c88a98fa5fa9f01228ea8c7d9de075966c13c716f0035c07d7bd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i53705109.exe

    Filesize

    1014KB

    MD5

    b9e55ffcec5185e5799bd0184496fbf5

    SHA1

    13d486997d8f4cdfe87924826800115e966674e7

    SHA256

    94976da79e0e3035ee19cf4d89ae5e2fd7959e743554a010e11e3b07c4cae827

    SHA512

    99b2ab0a4ce0793a86540cc3199b436f4251ea29ba137c956e6898e6058b24e8689cf4dc928ede49bd034b4ef4629d6984e3c8006444dacd674fc41e8a9f5a6f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i53705109.exe

    Filesize

    1014KB

    MD5

    b9e55ffcec5185e5799bd0184496fbf5

    SHA1

    13d486997d8f4cdfe87924826800115e966674e7

    SHA256

    94976da79e0e3035ee19cf4d89ae5e2fd7959e743554a010e11e3b07c4cae827

    SHA512

    99b2ab0a4ce0793a86540cc3199b436f4251ea29ba137c956e6898e6058b24e8689cf4dc928ede49bd034b4ef4629d6984e3c8006444dacd674fc41e8a9f5a6f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i87709883.exe

    Filesize

    843KB

    MD5

    bdb7d31c02950ad69665aa0740466278

    SHA1

    ab245763739b25a1372c6c828560a3c557cfb769

    SHA256

    cdb4ec5fb42faabe02df53e223720b806db231917441ee60b2d79cb790fb4773

    SHA512

    2e62a2bf448174617a81649b9375b938e4dcb3961339ef2ecafbdb26f355df1f767738f5da9b28b76feabd66bd1bc488c1db625be5ccfd6f298785081d68fffb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i87709883.exe

    Filesize

    843KB

    MD5

    bdb7d31c02950ad69665aa0740466278

    SHA1

    ab245763739b25a1372c6c828560a3c557cfb769

    SHA256

    cdb4ec5fb42faabe02df53e223720b806db231917441ee60b2d79cb790fb4773

    SHA512

    2e62a2bf448174617a81649b9375b938e4dcb3961339ef2ecafbdb26f355df1f767738f5da9b28b76feabd66bd1bc488c1db625be5ccfd6f298785081d68fffb

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i17519398.exe

    Filesize

    371KB

    MD5

    58195536021ac6dbac8dececbef73bcf

    SHA1

    fe9897aabdad201b9c016389e0d6633a4fa71eb1

    SHA256

    63565ea0aeb94e8c7f3944d9c01f51198e1644e185983779cf3ebed188738de4

    SHA512

    2e43e465eec9b14c2c34a2a3800745ffec9158f88ad8debee775ae7b62bff782ffb3452dd2f0acffaae2d33e24869f6f0251cd550a4f06ed75de9350663625b4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i17519398.exe

    Filesize

    371KB

    MD5

    58195536021ac6dbac8dececbef73bcf

    SHA1

    fe9897aabdad201b9c016389e0d6633a4fa71eb1

    SHA256

    63565ea0aeb94e8c7f3944d9c01f51198e1644e185983779cf3ebed188738de4

    SHA512

    2e43e465eec9b14c2c34a2a3800745ffec9158f88ad8debee775ae7b62bff782ffb3452dd2f0acffaae2d33e24869f6f0251cd550a4f06ed75de9350663625b4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a97890452.exe

    Filesize

    169KB

    MD5

    856ccbdebece9765c9ebd7bbfc80b43e

    SHA1

    7cf3bf7384c2a8de67f04ba51b9f985412e1e878

    SHA256

    ff10e8f626d23a23b6e9b9847c24490954dfaebbd1543e40506ab92b0a32d0a8

    SHA512

    bd4614ba14e6b5e31be9f5cb339e79a887fcdb22cc268908c0ad62c4e27c48d0c7c8e8ea0cb3b8fb2f4b2dafdc1e348b94ce7ab8fe16bb8d3ec8293ef24e7535

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a97890452.exe

    Filesize

    169KB

    MD5

    856ccbdebece9765c9ebd7bbfc80b43e

    SHA1

    7cf3bf7384c2a8de67f04ba51b9f985412e1e878

    SHA256

    ff10e8f626d23a23b6e9b9847c24490954dfaebbd1543e40506ab92b0a32d0a8

    SHA512

    bd4614ba14e6b5e31be9f5cb339e79a887fcdb22cc268908c0ad62c4e27c48d0c7c8e8ea0cb3b8fb2f4b2dafdc1e348b94ce7ab8fe16bb8d3ec8293ef24e7535

  • memory/1108-104-0x0000000000B30000-0x0000000000B60000-memory.dmp

    Filesize

    192KB

  • memory/1108-105-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/1108-106-0x0000000000A90000-0x0000000000AD0000-memory.dmp

    Filesize

    256KB

  • memory/1108-107-0x0000000000A90000-0x0000000000AD0000-memory.dmp

    Filesize

    256KB