Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 08:56

General

  • Target

    fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe

  • Size

    1.5MB

  • MD5

    8d302feb76da1f5008a155fb5b49687b

  • SHA1

    8398d068d5305f8a1b8eab5197691f19529386c5

  • SHA256

    fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e

  • SHA512

    5d85be7a5a4e45857b7654bff17a1e7e732b27cf12a27c82500d97ed359b0b186c37f79434d9726610873e1bd0b0b69d1c279227d7e37bde627b1ab49c5b8407

  • SSDEEP

    24576:8yecX29EPYNZT2wbLzY49Xp5FFWnMFy121B8TTuBTRi1O/HkL/zPkcHhqlJ/cm36:recXkEU92QzYYZ5FFWME12H8fuB9i1OD

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe
    "C:\Users\Admin\AppData\Local\Temp\fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1436
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:876

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exe
    Filesize

    1.3MB

    MD5

    e1e1ff2a129c57e0b7b95267af6e5fcc

    SHA1

    6fb4741d3ff57d613de19e4c5e8864ca98ade4a3

    SHA256

    841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534

    SHA512

    832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exe
    Filesize

    1.3MB

    MD5

    e1e1ff2a129c57e0b7b95267af6e5fcc

    SHA1

    6fb4741d3ff57d613de19e4c5e8864ca98ade4a3

    SHA256

    841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534

    SHA512

    832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exe
    Filesize

    1001KB

    MD5

    cc550caf2b25acbeda0add1ac6b9df6d

    SHA1

    f80923263f7c22beb32fb8dca98f45b1ce6778b9

    SHA256

    60057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab

    SHA512

    fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exe
    Filesize

    1001KB

    MD5

    cc550caf2b25acbeda0add1ac6b9df6d

    SHA1

    f80923263f7c22beb32fb8dca98f45b1ce6778b9

    SHA256

    60057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab

    SHA512

    fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exe
    Filesize

    829KB

    MD5

    14fd0c326fd1c1ba9bc03c1a3c42e1c1

    SHA1

    0d1e11ddd9f9fb4733d2221c4041423dbeea1812

    SHA256

    e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38

    SHA512

    39820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exe
    Filesize

    829KB

    MD5

    14fd0c326fd1c1ba9bc03c1a3c42e1c1

    SHA1

    0d1e11ddd9f9fb4733d2221c4041423dbeea1812

    SHA256

    e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38

    SHA512

    39820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exe
    Filesize

    364KB

    MD5

    e8d880721e82a52815a04c77411bf7d4

    SHA1

    4dadfb77301c0a3271b8ecf319dcec39c47db40b

    SHA256

    911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123

    SHA512

    fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exe
    Filesize

    364KB

    MD5

    e8d880721e82a52815a04c77411bf7d4

    SHA1

    4dadfb77301c0a3271b8ecf319dcec39c47db40b

    SHA256

    911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123

    SHA512

    fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exe
    Filesize

    170KB

    MD5

    4212a268045343e2c95e67fc01052946

    SHA1

    3c7d83f30e9f4136270ca7971e743b017f6aa725

    SHA256

    fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7

    SHA512

    0a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exe
    Filesize

    170KB

    MD5

    4212a268045343e2c95e67fc01052946

    SHA1

    3c7d83f30e9f4136270ca7971e743b017f6aa725

    SHA256

    fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7

    SHA512

    0a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exe
    Filesize

    1.3MB

    MD5

    e1e1ff2a129c57e0b7b95267af6e5fcc

    SHA1

    6fb4741d3ff57d613de19e4c5e8864ca98ade4a3

    SHA256

    841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534

    SHA512

    832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exe
    Filesize

    1.3MB

    MD5

    e1e1ff2a129c57e0b7b95267af6e5fcc

    SHA1

    6fb4741d3ff57d613de19e4c5e8864ca98ade4a3

    SHA256

    841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534

    SHA512

    832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exe
    Filesize

    1001KB

    MD5

    cc550caf2b25acbeda0add1ac6b9df6d

    SHA1

    f80923263f7c22beb32fb8dca98f45b1ce6778b9

    SHA256

    60057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab

    SHA512

    fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exe
    Filesize

    1001KB

    MD5

    cc550caf2b25acbeda0add1ac6b9df6d

    SHA1

    f80923263f7c22beb32fb8dca98f45b1ce6778b9

    SHA256

    60057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab

    SHA512

    fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exe
    Filesize

    829KB

    MD5

    14fd0c326fd1c1ba9bc03c1a3c42e1c1

    SHA1

    0d1e11ddd9f9fb4733d2221c4041423dbeea1812

    SHA256

    e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38

    SHA512

    39820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exe
    Filesize

    829KB

    MD5

    14fd0c326fd1c1ba9bc03c1a3c42e1c1

    SHA1

    0d1e11ddd9f9fb4733d2221c4041423dbeea1812

    SHA256

    e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38

    SHA512

    39820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exe
    Filesize

    364KB

    MD5

    e8d880721e82a52815a04c77411bf7d4

    SHA1

    4dadfb77301c0a3271b8ecf319dcec39c47db40b

    SHA256

    911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123

    SHA512

    fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exe
    Filesize

    364KB

    MD5

    e8d880721e82a52815a04c77411bf7d4

    SHA1

    4dadfb77301c0a3271b8ecf319dcec39c47db40b

    SHA256

    911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123

    SHA512

    fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exe
    Filesize

    170KB

    MD5

    4212a268045343e2c95e67fc01052946

    SHA1

    3c7d83f30e9f4136270ca7971e743b017f6aa725

    SHA256

    fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7

    SHA512

    0a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exe
    Filesize

    170KB

    MD5

    4212a268045343e2c95e67fc01052946

    SHA1

    3c7d83f30e9f4136270ca7971e743b017f6aa725

    SHA256

    fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7

    SHA512

    0a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4

  • memory/876-104-0x00000000000E0000-0x0000000000110000-memory.dmp
    Filesize

    192KB

  • memory/876-105-0x0000000000250000-0x0000000000256000-memory.dmp
    Filesize

    24KB

  • memory/876-106-0x00000000049F0000-0x0000000004A30000-memory.dmp
    Filesize

    256KB

  • memory/876-107-0x00000000049F0000-0x0000000004A30000-memory.dmp
    Filesize

    256KB