Analysis

  • max time kernel
    140s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2023, 07:14

General

  • Target

    0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe

  • Size

    771KB

  • MD5

    6c30bb3dec0e82a861ebcf1c5fed4975

  • SHA1

    976c2e28b88c3d2ae9b64dc24705bc765a79cc25

  • SHA256

    0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6

  • SHA512

    cbb8c9263ed3de3b00440a2b48823c478646884734d126a3c811a3c55b2c44f3b2d343e460e8e9a96c6e93836f083266e2eacef6bad23700756d9e2a5d567c37

  • SSDEEP

    12288:zMrwy90bv/isnRFvl9yOE40xmOLbErHJBUlW8Ajy7ZF5/ulW1YuDadz:TyhsRxl9y04xbsHJBUdAW1rNGz

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe
    "C:\Users\Admin\AppData\Local\Temp\0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1562783.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1562783.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0012399.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0012399.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1939442.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1939442.exe
          4⤵
          • Executes dropped EXE
          PID:2312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1562783.exe

    Filesize

    615KB

    MD5

    cf15523cd2a73c4c4248a38e7eea0d22

    SHA1

    b1b24047e4d8e060bf808c9d4e9b25b4565663e9

    SHA256

    4a9c321032371a33f501e2de202e776c0303bf144c54eba9ff1e4a196df30fe0

    SHA512

    44466849cb4abfd6d401c176629236994f3699a77cbe264cf70b274782cfc08e0c6e6f8682594590e46a970c2dd203ba521a50613f971540c4545264d75ab67c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1562783.exe

    Filesize

    615KB

    MD5

    cf15523cd2a73c4c4248a38e7eea0d22

    SHA1

    b1b24047e4d8e060bf808c9d4e9b25b4565663e9

    SHA256

    4a9c321032371a33f501e2de202e776c0303bf144c54eba9ff1e4a196df30fe0

    SHA512

    44466849cb4abfd6d401c176629236994f3699a77cbe264cf70b274782cfc08e0c6e6f8682594590e46a970c2dd203ba521a50613f971540c4545264d75ab67c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0012399.exe

    Filesize

    514KB

    MD5

    95fe311ccbb6ce747ae9970ebe084302

    SHA1

    dd5f8ea126dc0226f22ec2a1cefc594934ae1251

    SHA256

    6f1b69a4981f0b44c12e6d5b20d2d058c122a18136bae097852b4f98ae789193

    SHA512

    8152f82ac7de4cd90eb055247662a47e5cec8ea2592ebd6053f708f673fa2c956bb2f5d366cf382a18272bcc2d95b2973aa4ce491ae84f3953dce8642d7aa1bf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0012399.exe

    Filesize

    514KB

    MD5

    95fe311ccbb6ce747ae9970ebe084302

    SHA1

    dd5f8ea126dc0226f22ec2a1cefc594934ae1251

    SHA256

    6f1b69a4981f0b44c12e6d5b20d2d058c122a18136bae097852b4f98ae789193

    SHA512

    8152f82ac7de4cd90eb055247662a47e5cec8ea2592ebd6053f708f673fa2c956bb2f5d366cf382a18272bcc2d95b2973aa4ce491ae84f3953dce8642d7aa1bf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1939442.exe

    Filesize

    492KB

    MD5

    e52911bc1933eb3cac93d97fd9cd9634

    SHA1

    ddd957a746281b351e4b4172762730ada4b3e5d2

    SHA256

    eec7e6ff5212af652abd5afd062000557f211d334bd7f184617dd65cab4982ac

    SHA512

    f643fdf1d5b60ddd79b948d25639966a7b5c3e97779021f7979db10628f2935bcdfadcbe6b5927a13552ca4ac49ff6c710c6785bbad65c3672b5e7df162e8187

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1939442.exe

    Filesize

    492KB

    MD5

    e52911bc1933eb3cac93d97fd9cd9634

    SHA1

    ddd957a746281b351e4b4172762730ada4b3e5d2

    SHA256

    eec7e6ff5212af652abd5afd062000557f211d334bd7f184617dd65cab4982ac

    SHA512

    f643fdf1d5b60ddd79b948d25639966a7b5c3e97779021f7979db10628f2935bcdfadcbe6b5927a13552ca4ac49ff6c710c6785bbad65c3672b5e7df162e8187

  • memory/2312-154-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2312-155-0x0000000001FB0000-0x000000000203C000-memory.dmp

    Filesize

    560KB

  • memory/2312-161-0x0000000073F10000-0x00000000746C0000-memory.dmp

    Filesize

    7.7MB

  • memory/2312-162-0x0000000001FB0000-0x000000000203C000-memory.dmp

    Filesize

    560KB

  • memory/2312-163-0x0000000006B30000-0x0000000006B31000-memory.dmp

    Filesize

    4KB

  • memory/2312-164-0x0000000006D00000-0x0000000007318000-memory.dmp

    Filesize

    6.1MB

  • memory/2312-165-0x0000000007320000-0x000000000742A000-memory.dmp

    Filesize

    1.0MB

  • memory/2312-166-0x0000000006A90000-0x0000000006AA2000-memory.dmp

    Filesize

    72KB

  • memory/2312-167-0x0000000006CF0000-0x0000000006D00000-memory.dmp

    Filesize

    64KB

  • memory/2312-168-0x0000000006AB0000-0x0000000006AEC000-memory.dmp

    Filesize

    240KB

  • memory/2312-169-0x0000000073F10000-0x00000000746C0000-memory.dmp

    Filesize

    7.7MB

  • memory/2312-170-0x0000000006CF0000-0x0000000006D00000-memory.dmp

    Filesize

    64KB