Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 21:25

General

  • Target

    3b07b9c752b1da9234cadd0f6bbcf9a03a03e518605632e3d2991f9f4f6cee5c.exe

  • Size

    566KB

  • MD5

    5bea3d01474e5e8cd7222f54972dbbd7

  • SHA1

    f1e4941abae4017a5bbc8c969eaf83f3b7910feb

  • SHA256

    3b07b9c752b1da9234cadd0f6bbcf9a03a03e518605632e3d2991f9f4f6cee5c

  • SHA512

    a5ee2c78b121ec114b3b2ebd81f10416ab9f1ac862ddbf54798f0814a804ae23d85cd33131ff6778738552d67b1db69fd15ce1f019d66db27ec9be7aa173a9f6

  • SSDEEP

    12288:uMrdy90a53UFQM1HUg1eEu8+Z8bUkLAjpMfHm:jyhEFRJUP8+bAqcHm

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b07b9c752b1da9234cadd0f6bbcf9a03a03e518605632e3d2991f9f4f6cee5c.exe
    "C:\Users\Admin\AppData\Local\Temp\3b07b9c752b1da9234cadd0f6bbcf9a03a03e518605632e3d2991f9f4f6cee5c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6550192.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6550192.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3726718.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3726718.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6550192.exe

    Filesize

    308KB

    MD5

    e5f6290d6806a9ccaf91d7290a99e605

    SHA1

    4ad107020f44bb04a347cfcad42a1d016b764ccc

    SHA256

    36af389aea4ef725895527072c8f096050193d87f28f013ed7478d033283b6a1

    SHA512

    efa30e828c70ec442fb5b25a0096541d91fcf80eafc041276aa35349f475d9897dd77963657ef3a76597681ecf77ca0a0bf1725355a2310bb2b4353abab0896b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6550192.exe

    Filesize

    308KB

    MD5

    e5f6290d6806a9ccaf91d7290a99e605

    SHA1

    4ad107020f44bb04a347cfcad42a1d016b764ccc

    SHA256

    36af389aea4ef725895527072c8f096050193d87f28f013ed7478d033283b6a1

    SHA512

    efa30e828c70ec442fb5b25a0096541d91fcf80eafc041276aa35349f475d9897dd77963657ef3a76597681ecf77ca0a0bf1725355a2310bb2b4353abab0896b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3726718.exe

    Filesize

    169KB

    MD5

    020f0bd03aef9d8550489bf3cc8f2594

    SHA1

    f58b3f0ec292b287c8a58bcfd21bc3d152c36c19

    SHA256

    16b6342c9604e9437cdf4406e0ce0f104b2c728ec316ffc3cca263709c990a0c

    SHA512

    ea2d5c122daf90877d4cef88d541d0adafebf6aa338409fce682913105ef3a22a7d3c0fe74cf5d12fd7867363c6468a3fdb68985ab8fd3cc302403d1d70b1c71

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3726718.exe

    Filesize

    169KB

    MD5

    020f0bd03aef9d8550489bf3cc8f2594

    SHA1

    f58b3f0ec292b287c8a58bcfd21bc3d152c36c19

    SHA256

    16b6342c9604e9437cdf4406e0ce0f104b2c728ec316ffc3cca263709c990a0c

    SHA512

    ea2d5c122daf90877d4cef88d541d0adafebf6aa338409fce682913105ef3a22a7d3c0fe74cf5d12fd7867363c6468a3fdb68985ab8fd3cc302403d1d70b1c71

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y6550192.exe

    Filesize

    308KB

    MD5

    e5f6290d6806a9ccaf91d7290a99e605

    SHA1

    4ad107020f44bb04a347cfcad42a1d016b764ccc

    SHA256

    36af389aea4ef725895527072c8f096050193d87f28f013ed7478d033283b6a1

    SHA512

    efa30e828c70ec442fb5b25a0096541d91fcf80eafc041276aa35349f475d9897dd77963657ef3a76597681ecf77ca0a0bf1725355a2310bb2b4353abab0896b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y6550192.exe

    Filesize

    308KB

    MD5

    e5f6290d6806a9ccaf91d7290a99e605

    SHA1

    4ad107020f44bb04a347cfcad42a1d016b764ccc

    SHA256

    36af389aea4ef725895527072c8f096050193d87f28f013ed7478d033283b6a1

    SHA512

    efa30e828c70ec442fb5b25a0096541d91fcf80eafc041276aa35349f475d9897dd77963657ef3a76597681ecf77ca0a0bf1725355a2310bb2b4353abab0896b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k3726718.exe

    Filesize

    169KB

    MD5

    020f0bd03aef9d8550489bf3cc8f2594

    SHA1

    f58b3f0ec292b287c8a58bcfd21bc3d152c36c19

    SHA256

    16b6342c9604e9437cdf4406e0ce0f104b2c728ec316ffc3cca263709c990a0c

    SHA512

    ea2d5c122daf90877d4cef88d541d0adafebf6aa338409fce682913105ef3a22a7d3c0fe74cf5d12fd7867363c6468a3fdb68985ab8fd3cc302403d1d70b1c71

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k3726718.exe

    Filesize

    169KB

    MD5

    020f0bd03aef9d8550489bf3cc8f2594

    SHA1

    f58b3f0ec292b287c8a58bcfd21bc3d152c36c19

    SHA256

    16b6342c9604e9437cdf4406e0ce0f104b2c728ec316ffc3cca263709c990a0c

    SHA512

    ea2d5c122daf90877d4cef88d541d0adafebf6aa338409fce682913105ef3a22a7d3c0fe74cf5d12fd7867363c6468a3fdb68985ab8fd3cc302403d1d70b1c71

  • memory/1488-74-0x0000000000C20000-0x0000000000C50000-memory.dmp

    Filesize

    192KB

  • memory/1488-75-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/1488-76-0x0000000002560000-0x00000000025A0000-memory.dmp

    Filesize

    256KB

  • memory/1488-77-0x0000000002560000-0x00000000025A0000-memory.dmp

    Filesize

    256KB