Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2023 09:30

General

  • Target

    d595f92fd64f1992f3cfa556a1213f22.exe

  • Size

    514KB

  • MD5

    d595f92fd64f1992f3cfa556a1213f22

  • SHA1

    124392b3bb25cae2b99058363094c7fd90f6be2c

  • SHA256

    c8e5cd22f608cd7712cf958f6291ca2c805526763a288add257ebbe986d8c781

  • SHA512

    b0b9e90cc216384217e7a1e373808267ff405d8ae87b3161e2eec63001868a66f29aebd2365cc1de078b27dca7c2f5ce08c1cb407153797eb4d0d0ff072b6828

  • SSDEEP

    12288:EmYOKz47wrn1HjWvKPLD9h4lGsN/J+V3hB:9Y47wb1k4pAHNuR

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d595f92fd64f1992f3cfa556a1213f22.exe
    "C:\Users\Admin\AppData\Local\Temp\d595f92fd64f1992f3cfa556a1213f22.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9522452.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9522452.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9522452.exe

    Filesize

    319KB

    MD5

    e260fe61dd5af62d74b1a164e81750b1

    SHA1

    950f61662a0b73835296cc8a73f280f4b0812289

    SHA256

    78814a59060706e1a65362b1b7df7a0427f8fdbd821d18dc7481a19a1a53dd70

    SHA512

    525e8bd4df6820ede189cb38d8a72278837d71a4f2bbd4f14f29c71dba7561c0ab1c39bc05ca02e7cffdcfa61fcfd9a7d7f4451b90ba382008b80f393212fe09

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9522452.exe

    Filesize

    319KB

    MD5

    e260fe61dd5af62d74b1a164e81750b1

    SHA1

    950f61662a0b73835296cc8a73f280f4b0812289

    SHA256

    78814a59060706e1a65362b1b7df7a0427f8fdbd821d18dc7481a19a1a53dd70

    SHA512

    525e8bd4df6820ede189cb38d8a72278837d71a4f2bbd4f14f29c71dba7561c0ab1c39bc05ca02e7cffdcfa61fcfd9a7d7f4451b90ba382008b80f393212fe09

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe

    Filesize

    266KB

    MD5

    1d2ab3db2ac659c6faecfa9d8ad62020

    SHA1

    24bb1df4d3b710106473ec9b4245fc4416f119a6

    SHA256

    dd3a98c8babe2ba5dd5e9a3120fd1add0170ca7d0b2d68e22804fd07de979d0a

    SHA512

    a5df9a1669006265ddb06f843e6c622ad0dd1d7039e651bc0024ffbd505e76d98e54d20d011a966bb254b3fb382015ddb1b7494dc27fc7c42357d40b6ed5ad94

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe

    Filesize

    266KB

    MD5

    1d2ab3db2ac659c6faecfa9d8ad62020

    SHA1

    24bb1df4d3b710106473ec9b4245fc4416f119a6

    SHA256

    dd3a98c8babe2ba5dd5e9a3120fd1add0170ca7d0b2d68e22804fd07de979d0a

    SHA512

    a5df9a1669006265ddb06f843e6c622ad0dd1d7039e651bc0024ffbd505e76d98e54d20d011a966bb254b3fb382015ddb1b7494dc27fc7c42357d40b6ed5ad94

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe

    Filesize

    266KB

    MD5

    1d2ab3db2ac659c6faecfa9d8ad62020

    SHA1

    24bb1df4d3b710106473ec9b4245fc4416f119a6

    SHA256

    dd3a98c8babe2ba5dd5e9a3120fd1add0170ca7d0b2d68e22804fd07de979d0a

    SHA512

    a5df9a1669006265ddb06f843e6c622ad0dd1d7039e651bc0024ffbd505e76d98e54d20d011a966bb254b3fb382015ddb1b7494dc27fc7c42357d40b6ed5ad94

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9522452.exe

    Filesize

    319KB

    MD5

    e260fe61dd5af62d74b1a164e81750b1

    SHA1

    950f61662a0b73835296cc8a73f280f4b0812289

    SHA256

    78814a59060706e1a65362b1b7df7a0427f8fdbd821d18dc7481a19a1a53dd70

    SHA512

    525e8bd4df6820ede189cb38d8a72278837d71a4f2bbd4f14f29c71dba7561c0ab1c39bc05ca02e7cffdcfa61fcfd9a7d7f4451b90ba382008b80f393212fe09

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9522452.exe

    Filesize

    319KB

    MD5

    e260fe61dd5af62d74b1a164e81750b1

    SHA1

    950f61662a0b73835296cc8a73f280f4b0812289

    SHA256

    78814a59060706e1a65362b1b7df7a0427f8fdbd821d18dc7481a19a1a53dd70

    SHA512

    525e8bd4df6820ede189cb38d8a72278837d71a4f2bbd4f14f29c71dba7561c0ab1c39bc05ca02e7cffdcfa61fcfd9a7d7f4451b90ba382008b80f393212fe09

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe

    Filesize

    266KB

    MD5

    1d2ab3db2ac659c6faecfa9d8ad62020

    SHA1

    24bb1df4d3b710106473ec9b4245fc4416f119a6

    SHA256

    dd3a98c8babe2ba5dd5e9a3120fd1add0170ca7d0b2d68e22804fd07de979d0a

    SHA512

    a5df9a1669006265ddb06f843e6c622ad0dd1d7039e651bc0024ffbd505e76d98e54d20d011a966bb254b3fb382015ddb1b7494dc27fc7c42357d40b6ed5ad94

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe

    Filesize

    266KB

    MD5

    1d2ab3db2ac659c6faecfa9d8ad62020

    SHA1

    24bb1df4d3b710106473ec9b4245fc4416f119a6

    SHA256

    dd3a98c8babe2ba5dd5e9a3120fd1add0170ca7d0b2d68e22804fd07de979d0a

    SHA512

    a5df9a1669006265ddb06f843e6c622ad0dd1d7039e651bc0024ffbd505e76d98e54d20d011a966bb254b3fb382015ddb1b7494dc27fc7c42357d40b6ed5ad94

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\f9971862.exe

    Filesize

    266KB

    MD5

    1d2ab3db2ac659c6faecfa9d8ad62020

    SHA1

    24bb1df4d3b710106473ec9b4245fc4416f119a6

    SHA256

    dd3a98c8babe2ba5dd5e9a3120fd1add0170ca7d0b2d68e22804fd07de979d0a

    SHA512

    a5df9a1669006265ddb06f843e6c622ad0dd1d7039e651bc0024ffbd505e76d98e54d20d011a966bb254b3fb382015ddb1b7494dc27fc7c42357d40b6ed5ad94

  • memory/2420-54-0x0000000000220000-0x000000000028E000-memory.dmp

    Filesize

    440KB

  • memory/2568-83-0x0000000000260000-0x0000000000290000-memory.dmp

    Filesize

    192KB

  • memory/2568-87-0x0000000000B20000-0x0000000000B26000-memory.dmp

    Filesize

    24KB

  • memory/2568-88-0x00000000047A0000-0x00000000047E0000-memory.dmp

    Filesize

    256KB