Analysis

  • max time kernel
    125s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 08:56

General

  • Target

    fe170fe6e49af8e9674e5dca56a0e85d140fe34acef70bef0ffe1b7376556001.exe

  • Size

    795KB

  • MD5

    b892afeb1ce4ab22ed605925d01efaf9

  • SHA1

    81cdecc07f60373bfe2cef24ad651eb4ad6de2bf

  • SHA256

    fe170fe6e49af8e9674e5dca56a0e85d140fe34acef70bef0ffe1b7376556001

  • SHA512

    5fc72ec4c05471ba073394bb5b74939a696ff15cb729db509b964df5a2f57d40324c2d2b89c1d2815ab0995f598da55e249afcbf59766ec412e24c7a897a2c1e

  • SSDEEP

    24576:eyygowoVQ39hj+WPn8thhuzGaOoTDH30:tygwa3Pn8thhu1L

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe170fe6e49af8e9674e5dca56a0e85d140fe34acef70bef0ffe1b7376556001.exe
    "C:\Users\Admin\AppData\Local\Temp\fe170fe6e49af8e9674e5dca56a0e85d140fe34acef70bef0ffe1b7376556001.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x42067858.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x42067858.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n84097109.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n84097109.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:904

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x42067858.exe
    Filesize

    590KB

    MD5

    3d10adf2bac8f41df7d5e627ab83e1ea

    SHA1

    4bc8ca336e3f0ce84e95edb0ade378080374cede

    SHA256

    ec96634cd2a5df3f967a2760cf19d60d3ad56f7e9a4cf924ef75a02a4f2ddd86

    SHA512

    5f85d3be04812bf242d772c346181e8bb027ff40e604089ce821d3371558cc2f38b93002d0af3b28422e42c684d810cff9dab05c71c02dbb5d9a41786309c10e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x42067858.exe
    Filesize

    590KB

    MD5

    3d10adf2bac8f41df7d5e627ab83e1ea

    SHA1

    4bc8ca336e3f0ce84e95edb0ade378080374cede

    SHA256

    ec96634cd2a5df3f967a2760cf19d60d3ad56f7e9a4cf924ef75a02a4f2ddd86

    SHA512

    5f85d3be04812bf242d772c346181e8bb027ff40e604089ce821d3371558cc2f38b93002d0af3b28422e42c684d810cff9dab05c71c02dbb5d9a41786309c10e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
    Filesize

    530KB

    MD5

    b8fa58e6ea85f84dde79210ccf6db1b6

    SHA1

    147e000c7daabba6f0e762037b6452c352e0e339

    SHA256

    08611893e4a6ec951bd1357a90b9fa7daa85d1bf05a46daf7f91bdeb78dd609d

    SHA512

    5e62224b4325852ff70c6c7d288c77b741557ca4001408be1e4b3a168210d39fa92f4a65ef3f45c9bc499ed48d02146c6f456aa75f1140b624c6989c5b435c17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
    Filesize

    530KB

    MD5

    b8fa58e6ea85f84dde79210ccf6db1b6

    SHA1

    147e000c7daabba6f0e762037b6452c352e0e339

    SHA256

    08611893e4a6ec951bd1357a90b9fa7daa85d1bf05a46daf7f91bdeb78dd609d

    SHA512

    5e62224b4325852ff70c6c7d288c77b741557ca4001408be1e4b3a168210d39fa92f4a65ef3f45c9bc499ed48d02146c6f456aa75f1140b624c6989c5b435c17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
    Filesize

    530KB

    MD5

    b8fa58e6ea85f84dde79210ccf6db1b6

    SHA1

    147e000c7daabba6f0e762037b6452c352e0e339

    SHA256

    08611893e4a6ec951bd1357a90b9fa7daa85d1bf05a46daf7f91bdeb78dd609d

    SHA512

    5e62224b4325852ff70c6c7d288c77b741557ca4001408be1e4b3a168210d39fa92f4a65ef3f45c9bc499ed48d02146c6f456aa75f1140b624c6989c5b435c17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n84097109.exe
    Filesize

    169KB

    MD5

    ccf0323ce289a61f3fa33a048f0edf66

    SHA1

    114faca0ed97c152132f1fab0d69be465c7888a4

    SHA256

    5e46ba5f413f08c250e662c407f38129d2746d4de85e4b64d8fb7c6540bff035

    SHA512

    b996b2fa523bb3122cd9a83e3f15ac2a6d06f6fffd6ed706bd689c7829fa1613169bd58e71176339e7b21af2a7f73e4be9c2490eebb413fb1eaf89206e136c0a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n84097109.exe
    Filesize

    169KB

    MD5

    ccf0323ce289a61f3fa33a048f0edf66

    SHA1

    114faca0ed97c152132f1fab0d69be465c7888a4

    SHA256

    5e46ba5f413f08c250e662c407f38129d2746d4de85e4b64d8fb7c6540bff035

    SHA512

    b996b2fa523bb3122cd9a83e3f15ac2a6d06f6fffd6ed706bd689c7829fa1613169bd58e71176339e7b21af2a7f73e4be9c2490eebb413fb1eaf89206e136c0a

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x42067858.exe
    Filesize

    590KB

    MD5

    3d10adf2bac8f41df7d5e627ab83e1ea

    SHA1

    4bc8ca336e3f0ce84e95edb0ade378080374cede

    SHA256

    ec96634cd2a5df3f967a2760cf19d60d3ad56f7e9a4cf924ef75a02a4f2ddd86

    SHA512

    5f85d3be04812bf242d772c346181e8bb027ff40e604089ce821d3371558cc2f38b93002d0af3b28422e42c684d810cff9dab05c71c02dbb5d9a41786309c10e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x42067858.exe
    Filesize

    590KB

    MD5

    3d10adf2bac8f41df7d5e627ab83e1ea

    SHA1

    4bc8ca336e3f0ce84e95edb0ade378080374cede

    SHA256

    ec96634cd2a5df3f967a2760cf19d60d3ad56f7e9a4cf924ef75a02a4f2ddd86

    SHA512

    5f85d3be04812bf242d772c346181e8bb027ff40e604089ce821d3371558cc2f38b93002d0af3b28422e42c684d810cff9dab05c71c02dbb5d9a41786309c10e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
    Filesize

    530KB

    MD5

    b8fa58e6ea85f84dde79210ccf6db1b6

    SHA1

    147e000c7daabba6f0e762037b6452c352e0e339

    SHA256

    08611893e4a6ec951bd1357a90b9fa7daa85d1bf05a46daf7f91bdeb78dd609d

    SHA512

    5e62224b4325852ff70c6c7d288c77b741557ca4001408be1e4b3a168210d39fa92f4a65ef3f45c9bc499ed48d02146c6f456aa75f1140b624c6989c5b435c17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
    Filesize

    530KB

    MD5

    b8fa58e6ea85f84dde79210ccf6db1b6

    SHA1

    147e000c7daabba6f0e762037b6452c352e0e339

    SHA256

    08611893e4a6ec951bd1357a90b9fa7daa85d1bf05a46daf7f91bdeb78dd609d

    SHA512

    5e62224b4325852ff70c6c7d288c77b741557ca4001408be1e4b3a168210d39fa92f4a65ef3f45c9bc499ed48d02146c6f456aa75f1140b624c6989c5b435c17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m21465780.exe
    Filesize

    530KB

    MD5

    b8fa58e6ea85f84dde79210ccf6db1b6

    SHA1

    147e000c7daabba6f0e762037b6452c352e0e339

    SHA256

    08611893e4a6ec951bd1357a90b9fa7daa85d1bf05a46daf7f91bdeb78dd609d

    SHA512

    5e62224b4325852ff70c6c7d288c77b741557ca4001408be1e4b3a168210d39fa92f4a65ef3f45c9bc499ed48d02146c6f456aa75f1140b624c6989c5b435c17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n84097109.exe
    Filesize

    169KB

    MD5

    ccf0323ce289a61f3fa33a048f0edf66

    SHA1

    114faca0ed97c152132f1fab0d69be465c7888a4

    SHA256

    5e46ba5f413f08c250e662c407f38129d2746d4de85e4b64d8fb7c6540bff035

    SHA512

    b996b2fa523bb3122cd9a83e3f15ac2a6d06f6fffd6ed706bd689c7829fa1613169bd58e71176339e7b21af2a7f73e4be9c2490eebb413fb1eaf89206e136c0a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n84097109.exe
    Filesize

    169KB

    MD5

    ccf0323ce289a61f3fa33a048f0edf66

    SHA1

    114faca0ed97c152132f1fab0d69be465c7888a4

    SHA256

    5e46ba5f413f08c250e662c407f38129d2746d4de85e4b64d8fb7c6540bff035

    SHA512

    b996b2fa523bb3122cd9a83e3f15ac2a6d06f6fffd6ed706bd689c7829fa1613169bd58e71176339e7b21af2a7f73e4be9c2490eebb413fb1eaf89206e136c0a

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/364-2252-0x0000000000BB0000-0x0000000000BF0000-memory.dmp
    Filesize

    256KB

  • memory/364-2250-0x0000000000BB0000-0x0000000000BF0000-memory.dmp
    Filesize

    256KB

  • memory/364-2245-0x0000000000320000-0x0000000000326000-memory.dmp
    Filesize

    24KB

  • memory/364-2240-0x0000000000820000-0x000000000084E000-memory.dmp
    Filesize

    184KB

  • memory/804-118-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-138-0x00000000051E0000-0x0000000005220000-memory.dmp
    Filesize

    256KB

  • memory/804-104-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-102-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-108-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-106-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-112-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-110-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-114-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-116-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-100-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-122-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-124-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-120-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-128-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-126-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-134-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-132-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-130-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-137-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-136-0x00000000051E0000-0x0000000005220000-memory.dmp
    Filesize

    256KB

  • memory/804-98-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-141-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-140-0x00000000051E0000-0x0000000005220000-memory.dmp
    Filesize

    256KB

  • memory/804-143-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-145-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-147-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-2230-0x0000000001280000-0x00000000012B2000-memory.dmp
    Filesize

    200KB

  • memory/804-94-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-96-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-92-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-90-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-88-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-86-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-84-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-82-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-81-0x00000000028F0000-0x0000000002950000-memory.dmp
    Filesize

    384KB

  • memory/804-78-0x00000000002A0000-0x00000000002FB000-memory.dmp
    Filesize

    364KB

  • memory/804-80-0x00000000028F0000-0x0000000002956000-memory.dmp
    Filesize

    408KB

  • memory/804-79-0x0000000002BC0000-0x0000000002C28000-memory.dmp
    Filesize

    416KB

  • memory/904-2249-0x0000000000330000-0x0000000000336000-memory.dmp
    Filesize

    24KB

  • memory/904-2251-0x0000000000CB0000-0x0000000000CF0000-memory.dmp
    Filesize

    256KB

  • memory/904-2248-0x0000000000D00000-0x0000000000D30000-memory.dmp
    Filesize

    192KB

  • memory/904-2253-0x0000000000CB0000-0x0000000000CF0000-memory.dmp
    Filesize

    256KB