Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:21

General

  • Target

    08641eb274a26a76d8f5973137d49e6717abaf48820d7f8a11fea5cc0ca182c8.exe

  • Size

    1.5MB

  • MD5

    5b0a49556a45f2e36ffdb19069ed1b22

  • SHA1

    42ef9f79ab5f1d4d5467e7760b7466cee885bb9b

  • SHA256

    08641eb274a26a76d8f5973137d49e6717abaf48820d7f8a11fea5cc0ca182c8

  • SHA512

    b4e5ebc21903ade46b5bcbe766b8f6d548adae31429b9f42eaab51bd361e4c3a14c1698248dd04aaff7927f434d808e5dd06bacb0cedc1c8e7a965de16753d61

  • SSDEEP

    24576:vyETBKMA43S0Q/E1tungGOXTPFkSk/xsJ+pLb0y0khMHJzV0tGcqAJnI0S:6ETIM7i0eE1MEt8ZWwbdhgZcqyf

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08641eb274a26a76d8f5973137d49e6717abaf48820d7f8a11fea5cc0ca182c8.exe
    "C:\Users\Admin\AppData\Local\Temp\08641eb274a26a76d8f5973137d49e6717abaf48820d7f8a11fea5cc0ca182c8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i47436851.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i47436851.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75385278.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75385278.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i14694386.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i14694386.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1260
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i58974323.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i58974323.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1848
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a48707280.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a48707280.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i47436851.exe

    Filesize

    1.3MB

    MD5

    286729809f6cac58b2d3068a5c9e3c94

    SHA1

    b64c69520e4746c8a5a8d9f59b3fcaa75311b2bf

    SHA256

    50205b11f87421fdb62a4c68dd4b44c1f14d0e8083fc3f079dd099bac61461dd

    SHA512

    b115c397b9ca1f062a0af6f00e09a7f263ba172960de2af978f99a6bac81ec2166a96229bace58da5e65c726420dc32a2623aa7308c66c078f250a4b46a3073e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i47436851.exe

    Filesize

    1.3MB

    MD5

    286729809f6cac58b2d3068a5c9e3c94

    SHA1

    b64c69520e4746c8a5a8d9f59b3fcaa75311b2bf

    SHA256

    50205b11f87421fdb62a4c68dd4b44c1f14d0e8083fc3f079dd099bac61461dd

    SHA512

    b115c397b9ca1f062a0af6f00e09a7f263ba172960de2af978f99a6bac81ec2166a96229bace58da5e65c726420dc32a2623aa7308c66c078f250a4b46a3073e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75385278.exe

    Filesize

    1015KB

    MD5

    f2ea86e289c8e299710fa94b22ff3b7a

    SHA1

    847f3e1df92e6d75d7634febbafcceb42cee0b7f

    SHA256

    954ab01b18592d32454afad405f82b9f2afc860007dcb9caf33bc2d9ebe00827

    SHA512

    a6f2f1d58d34296a05db787351286222664bbbc26b6553f9c450c3c23256eaf492bd96de16e3c2a69bd1c77c1b6dab75afc46662ca44acd1668b361c0b1c22ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75385278.exe

    Filesize

    1015KB

    MD5

    f2ea86e289c8e299710fa94b22ff3b7a

    SHA1

    847f3e1df92e6d75d7634febbafcceb42cee0b7f

    SHA256

    954ab01b18592d32454afad405f82b9f2afc860007dcb9caf33bc2d9ebe00827

    SHA512

    a6f2f1d58d34296a05db787351286222664bbbc26b6553f9c450c3c23256eaf492bd96de16e3c2a69bd1c77c1b6dab75afc46662ca44acd1668b361c0b1c22ec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i14694386.exe

    Filesize

    843KB

    MD5

    459356cc2a85b484cd423a93caad6b7f

    SHA1

    9a03a3ab1653afdc0536c0eff4f3815c17735051

    SHA256

    48e52f44094ed8be47fe84254ab6c4f84db6dfcfb1d5c542b5da2b93ae56c97b

    SHA512

    9bd8a6952a989ca41775ac2020835e198f2019f80c842527557d488ef97725b353365fa64273e7323cf3845badba3b25135a87e603f1dd41bd96b5483d0631cd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i14694386.exe

    Filesize

    843KB

    MD5

    459356cc2a85b484cd423a93caad6b7f

    SHA1

    9a03a3ab1653afdc0536c0eff4f3815c17735051

    SHA256

    48e52f44094ed8be47fe84254ab6c4f84db6dfcfb1d5c542b5da2b93ae56c97b

    SHA512

    9bd8a6952a989ca41775ac2020835e198f2019f80c842527557d488ef97725b353365fa64273e7323cf3845badba3b25135a87e603f1dd41bd96b5483d0631cd

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i58974323.exe

    Filesize

    371KB

    MD5

    a2f78486eb9c97ba3b6cd4b7a97df121

    SHA1

    b8a662b5cf348f8af91fe7dcce28c3783e06af82

    SHA256

    8dd85761c39ee8c4325ac11d03ad4a9bd72c3f8cd7e81db4d2b575cb32319c91

    SHA512

    bf5ba05ed8154906f504ae96b0d91de887995f507f0a32b9ca9a9c438df03556e2a9d17bb3c281547254bdde299a2cfee239847e65cea6483315045564d28db4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i58974323.exe

    Filesize

    371KB

    MD5

    a2f78486eb9c97ba3b6cd4b7a97df121

    SHA1

    b8a662b5cf348f8af91fe7dcce28c3783e06af82

    SHA256

    8dd85761c39ee8c4325ac11d03ad4a9bd72c3f8cd7e81db4d2b575cb32319c91

    SHA512

    bf5ba05ed8154906f504ae96b0d91de887995f507f0a32b9ca9a9c438df03556e2a9d17bb3c281547254bdde299a2cfee239847e65cea6483315045564d28db4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a48707280.exe

    Filesize

    169KB

    MD5

    93b82a7bd266e68c5306f9135b76014c

    SHA1

    9b0c96a8e82d0562847aee587e66d4f1f5fd4dbf

    SHA256

    559574bcca1eabb1a5c332a2c96b0b25096a9825e3ca12320e0680259031f1c7

    SHA512

    413f933d984f59a22252ecc7ff6d840d55690ef2b0d2bd9efdf883128b584b855aa4b74484446f4a735807137db0c0ff75d688024dc4d7ede5b365d2bb828606

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a48707280.exe

    Filesize

    169KB

    MD5

    93b82a7bd266e68c5306f9135b76014c

    SHA1

    9b0c96a8e82d0562847aee587e66d4f1f5fd4dbf

    SHA256

    559574bcca1eabb1a5c332a2c96b0b25096a9825e3ca12320e0680259031f1c7

    SHA512

    413f933d984f59a22252ecc7ff6d840d55690ef2b0d2bd9efdf883128b584b855aa4b74484446f4a735807137db0c0ff75d688024dc4d7ede5b365d2bb828606

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i47436851.exe

    Filesize

    1.3MB

    MD5

    286729809f6cac58b2d3068a5c9e3c94

    SHA1

    b64c69520e4746c8a5a8d9f59b3fcaa75311b2bf

    SHA256

    50205b11f87421fdb62a4c68dd4b44c1f14d0e8083fc3f079dd099bac61461dd

    SHA512

    b115c397b9ca1f062a0af6f00e09a7f263ba172960de2af978f99a6bac81ec2166a96229bace58da5e65c726420dc32a2623aa7308c66c078f250a4b46a3073e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i47436851.exe

    Filesize

    1.3MB

    MD5

    286729809f6cac58b2d3068a5c9e3c94

    SHA1

    b64c69520e4746c8a5a8d9f59b3fcaa75311b2bf

    SHA256

    50205b11f87421fdb62a4c68dd4b44c1f14d0e8083fc3f079dd099bac61461dd

    SHA512

    b115c397b9ca1f062a0af6f00e09a7f263ba172960de2af978f99a6bac81ec2166a96229bace58da5e65c726420dc32a2623aa7308c66c078f250a4b46a3073e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i75385278.exe

    Filesize

    1015KB

    MD5

    f2ea86e289c8e299710fa94b22ff3b7a

    SHA1

    847f3e1df92e6d75d7634febbafcceb42cee0b7f

    SHA256

    954ab01b18592d32454afad405f82b9f2afc860007dcb9caf33bc2d9ebe00827

    SHA512

    a6f2f1d58d34296a05db787351286222664bbbc26b6553f9c450c3c23256eaf492bd96de16e3c2a69bd1c77c1b6dab75afc46662ca44acd1668b361c0b1c22ec

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i75385278.exe

    Filesize

    1015KB

    MD5

    f2ea86e289c8e299710fa94b22ff3b7a

    SHA1

    847f3e1df92e6d75d7634febbafcceb42cee0b7f

    SHA256

    954ab01b18592d32454afad405f82b9f2afc860007dcb9caf33bc2d9ebe00827

    SHA512

    a6f2f1d58d34296a05db787351286222664bbbc26b6553f9c450c3c23256eaf492bd96de16e3c2a69bd1c77c1b6dab75afc46662ca44acd1668b361c0b1c22ec

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i14694386.exe

    Filesize

    843KB

    MD5

    459356cc2a85b484cd423a93caad6b7f

    SHA1

    9a03a3ab1653afdc0536c0eff4f3815c17735051

    SHA256

    48e52f44094ed8be47fe84254ab6c4f84db6dfcfb1d5c542b5da2b93ae56c97b

    SHA512

    9bd8a6952a989ca41775ac2020835e198f2019f80c842527557d488ef97725b353365fa64273e7323cf3845badba3b25135a87e603f1dd41bd96b5483d0631cd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i14694386.exe

    Filesize

    843KB

    MD5

    459356cc2a85b484cd423a93caad6b7f

    SHA1

    9a03a3ab1653afdc0536c0eff4f3815c17735051

    SHA256

    48e52f44094ed8be47fe84254ab6c4f84db6dfcfb1d5c542b5da2b93ae56c97b

    SHA512

    9bd8a6952a989ca41775ac2020835e198f2019f80c842527557d488ef97725b353365fa64273e7323cf3845badba3b25135a87e603f1dd41bd96b5483d0631cd

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i58974323.exe

    Filesize

    371KB

    MD5

    a2f78486eb9c97ba3b6cd4b7a97df121

    SHA1

    b8a662b5cf348f8af91fe7dcce28c3783e06af82

    SHA256

    8dd85761c39ee8c4325ac11d03ad4a9bd72c3f8cd7e81db4d2b575cb32319c91

    SHA512

    bf5ba05ed8154906f504ae96b0d91de887995f507f0a32b9ca9a9c438df03556e2a9d17bb3c281547254bdde299a2cfee239847e65cea6483315045564d28db4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i58974323.exe

    Filesize

    371KB

    MD5

    a2f78486eb9c97ba3b6cd4b7a97df121

    SHA1

    b8a662b5cf348f8af91fe7dcce28c3783e06af82

    SHA256

    8dd85761c39ee8c4325ac11d03ad4a9bd72c3f8cd7e81db4d2b575cb32319c91

    SHA512

    bf5ba05ed8154906f504ae96b0d91de887995f507f0a32b9ca9a9c438df03556e2a9d17bb3c281547254bdde299a2cfee239847e65cea6483315045564d28db4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a48707280.exe

    Filesize

    169KB

    MD5

    93b82a7bd266e68c5306f9135b76014c

    SHA1

    9b0c96a8e82d0562847aee587e66d4f1f5fd4dbf

    SHA256

    559574bcca1eabb1a5c332a2c96b0b25096a9825e3ca12320e0680259031f1c7

    SHA512

    413f933d984f59a22252ecc7ff6d840d55690ef2b0d2bd9efdf883128b584b855aa4b74484446f4a735807137db0c0ff75d688024dc4d7ede5b365d2bb828606

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a48707280.exe

    Filesize

    169KB

    MD5

    93b82a7bd266e68c5306f9135b76014c

    SHA1

    9b0c96a8e82d0562847aee587e66d4f1f5fd4dbf

    SHA256

    559574bcca1eabb1a5c332a2c96b0b25096a9825e3ca12320e0680259031f1c7

    SHA512

    413f933d984f59a22252ecc7ff6d840d55690ef2b0d2bd9efdf883128b584b855aa4b74484446f4a735807137db0c0ff75d688024dc4d7ede5b365d2bb828606

  • memory/1140-104-0x00000000013E0000-0x0000000001410000-memory.dmp

    Filesize

    192KB

  • memory/1140-105-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/1140-106-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1140-107-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB