Analysis

  • max time kernel
    249s
  • max time network
    269s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2023, 17:30

General

  • Target

    427ea0301cd906578a44444cd20d8306519b52169d4140877ff748d6d19f2804.exe

  • Size

    479KB

  • MD5

    4acdf8683387bea4a63101af7f95df57

  • SHA1

    3b323ec5c62e54397f28793df3ce9082bee813d3

  • SHA256

    427ea0301cd906578a44444cd20d8306519b52169d4140877ff748d6d19f2804

  • SHA512

    b1c76e986c6dfe35474f4168a0deb059b0e8012a4afcf633de473ee980fab092c8505c3de0510e4f0e5eb65af17a7758cc44e2ed23513cd91e32c54084e135cf

  • SSDEEP

    6144:KIy+bnr+ep0yN90QE6brteWPmXZ5V2O6JFQmPf7g6uWsNUvhtEe26uiCADg/i4jo:sMryy908sZf21rrru/NICADgpCe4wc

Malware Config

Extracted

Family

redline

Botnet

dion

C2

217.196.96.101:4132

Attributes
  • auth_value

    6e0b6a3255923968b15f61a2c040c5c9

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\427ea0301cd906578a44444cd20d8306519b52169d4140877ff748d6d19f2804.exe
    "C:\Users\Admin\AppData\Local\Temp\427ea0301cd906578a44444cd20d8306519b52169d4140877ff748d6d19f2804.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194880.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194880.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7933142.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7933142.exe
        3⤵
        • Executes dropped EXE
        PID:4012

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194880.exe

          Filesize

          308KB

          MD5

          254e4aef6924fa573d8d8b9556cdf784

          SHA1

          d904f63b593ebfbbe20c115a78dd430a5f41d1f5

          SHA256

          ca374d052b959c9a3cce016a49526104aaf567b0329ac0d136b8e5666d9ccfeb

          SHA512

          351cfbcaaf8834daa9b754916741b3ce184dd174c07db8ac580c79d7c86e746230c4131a9a011470fd5570b615406c41fb0e49abbe966b5bdb0a2452bf166253

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194880.exe

          Filesize

          308KB

          MD5

          254e4aef6924fa573d8d8b9556cdf784

          SHA1

          d904f63b593ebfbbe20c115a78dd430a5f41d1f5

          SHA256

          ca374d052b959c9a3cce016a49526104aaf567b0329ac0d136b8e5666d9ccfeb

          SHA512

          351cfbcaaf8834daa9b754916741b3ce184dd174c07db8ac580c79d7c86e746230c4131a9a011470fd5570b615406c41fb0e49abbe966b5bdb0a2452bf166253

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7933142.exe

          Filesize

          168KB

          MD5

          5d9ef8abb37775445631ef2e000a93da

          SHA1

          a7334252ee9b6c5bb5ece7140f6ee966f0e5e93e

          SHA256

          601b07f14ed32661a7372277a4b2b979e141a56151179dadfd9211269fb2b6f2

          SHA512

          39da16ebbe608e667fce86dfa421646735d251e13132a9a2deb99ce1d72bc2a087d19c3da1ede5e3b2e837f632d34e3e8de32ce57343bfbf23211299f2a4de78

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7933142.exe

          Filesize

          168KB

          MD5

          5d9ef8abb37775445631ef2e000a93da

          SHA1

          a7334252ee9b6c5bb5ece7140f6ee966f0e5e93e

          SHA256

          601b07f14ed32661a7372277a4b2b979e141a56151179dadfd9211269fb2b6f2

          SHA512

          39da16ebbe608e667fce86dfa421646735d251e13132a9a2deb99ce1d72bc2a087d19c3da1ede5e3b2e837f632d34e3e8de32ce57343bfbf23211299f2a4de78

        • memory/4012-147-0x0000000000B80000-0x0000000000BB0000-memory.dmp

          Filesize

          192KB

        • memory/4012-148-0x000000000B050000-0x000000000B668000-memory.dmp

          Filesize

          6.1MB

        • memory/4012-149-0x000000000AB40000-0x000000000AC4A000-memory.dmp

          Filesize

          1.0MB

        • memory/4012-150-0x000000000AA30000-0x000000000AA42000-memory.dmp

          Filesize

          72KB

        • memory/4012-151-0x00000000055A0000-0x00000000055B0000-memory.dmp

          Filesize

          64KB

        • memory/4012-152-0x00000000055A0000-0x00000000055B0000-memory.dmp

          Filesize

          64KB

        • memory/4012-153-0x00000000055B0000-0x00000000055EC000-memory.dmp

          Filesize

          240KB

        • memory/4012-154-0x0000000002D20000-0x0000000002D96000-memory.dmp

          Filesize

          472KB

        • memory/4012-155-0x000000000AF90000-0x000000000B022000-memory.dmp

          Filesize

          584KB

        • memory/4012-156-0x0000000002DA0000-0x0000000002E06000-memory.dmp

          Filesize

          408KB