Analysis

  • max time kernel
    273s
  • max time network
    345s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2023, 20:47

General

  • Target

    a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe

  • Size

    480KB

  • MD5

    21176b5237799572b0a96e2e806cf88d

  • SHA1

    2b94b698d55cc49067e0ac5db388a449b2dc7f74

  • SHA256

    a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33

  • SHA512

    30c941ef4615335b3b64eece04d103eb038e1a1c5f1592a3caf818ecea112cbe18b7ebef197a0a1630ae18d5c59d1548927c2c8959cd4eec39754650bdb9949c

  • SSDEEP

    12288:tMrYy90BL6k59WVilyHtIJ6bqEq/aHI0p+Mq6UUeCH:ByiOnMYOJTj/aWr7c

Malware Config

Extracted

Family

redline

Botnet

dion

C2

217.196.96.101:4132

Attributes
  • auth_value

    6e0b6a3255923968b15f61a2c040c5c9

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe
    "C:\Users\Admin\AppData\Local\Temp\a5daca9410b20667b556cee112dcef772a179b4648ec7868a5d5fb665f713d33.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5264776.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5264776.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7069800.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7069800.exe
        3⤵
        • Executes dropped EXE
        PID:624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5264776.exe

    Filesize

    308KB

    MD5

    a75a6b9931b7100c54a01018b88f7092

    SHA1

    bee6dade4181a61f11003e5df74ab6ea7cdab54b

    SHA256

    29803e7e4ca1e959ac917455dd626087d55a385334fb402ce8d80d1ce7bfc439

    SHA512

    adb853b15164a7e77177ba2865b68048a3ad6e396fefcba0d1be2241aa2913cc2f2f24f6733344f8777abd0cd5797b924d05e2144dc2fb393cf7fc243c3c0a64

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5264776.exe

    Filesize

    308KB

    MD5

    a75a6b9931b7100c54a01018b88f7092

    SHA1

    bee6dade4181a61f11003e5df74ab6ea7cdab54b

    SHA256

    29803e7e4ca1e959ac917455dd626087d55a385334fb402ce8d80d1ce7bfc439

    SHA512

    adb853b15164a7e77177ba2865b68048a3ad6e396fefcba0d1be2241aa2913cc2f2f24f6733344f8777abd0cd5797b924d05e2144dc2fb393cf7fc243c3c0a64

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7069800.exe

    Filesize

    168KB

    MD5

    7da678f09885734417bbb01a9609e79f

    SHA1

    4e492efe0bedd7f82595cceb01923a2ec430d1ed

    SHA256

    f487d3190aca85b64f1ac9b7928bd477bc503d58e7dc96ba2634a693e2c5b570

    SHA512

    e16aab006e096ff95fcc8249f47f20b1c7d25d8c5b14da172d4fc4aa885c900d309a319e43e26b94a2da9b5494438365514fc530ade266c9bdad14f9fdcd9858

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7069800.exe

    Filesize

    168KB

    MD5

    7da678f09885734417bbb01a9609e79f

    SHA1

    4e492efe0bedd7f82595cceb01923a2ec430d1ed

    SHA256

    f487d3190aca85b64f1ac9b7928bd477bc503d58e7dc96ba2634a693e2c5b570

    SHA512

    e16aab006e096ff95fcc8249f47f20b1c7d25d8c5b14da172d4fc4aa885c900d309a319e43e26b94a2da9b5494438365514fc530ade266c9bdad14f9fdcd9858

  • memory/624-147-0x0000000000380000-0x00000000003B0000-memory.dmp

    Filesize

    192KB

  • memory/624-148-0x0000000005300000-0x0000000005918000-memory.dmp

    Filesize

    6.1MB

  • memory/624-149-0x0000000004DF0000-0x0000000004EFA000-memory.dmp

    Filesize

    1.0MB

  • memory/624-150-0x0000000004CE0000-0x0000000004CF2000-memory.dmp

    Filesize

    72KB

  • memory/624-151-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/624-152-0x0000000004D40000-0x0000000004D7C000-memory.dmp

    Filesize

    240KB

  • memory/624-153-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB