Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2023, 06:05

General

  • Target

    19eba0d44e1fa574d3772d7e3ea3a5fffd4544f8dc9012af87531b6a2302eb00.exe

  • Size

    854KB

  • MD5

    82744a748e483776edd4787336182bca

  • SHA1

    f1ca054af178d7426ec399e040a384c83b2e713a

  • SHA256

    19eba0d44e1fa574d3772d7e3ea3a5fffd4544f8dc9012af87531b6a2302eb00

  • SHA512

    88fc3a824cc74f3bfda2122c9133bda3923a6fb465eb76ba685a47907615dfee37dabf6904cd371c5b981421a7570da7cc7d5f86d0c9312df1b6a8bfb58a889f

  • SSDEEP

    12288:9MrQy90KYQU3dgUAVE7moJ1IMwekToiDnnxG/k9Su/Nqd+kyDmkt7iq:ZyR1U3O5uNLIMw2iDxMc/Ahs9

Malware Config

Extracted

Family

redline

Botnet

dava

C2

77.91.124.54:19071

Attributes
  • auth_value

    3ce5222c1baaa06681dfe0012ce1de23

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19eba0d44e1fa574d3772d7e3ea3a5fffd4544f8dc9012af87531b6a2302eb00.exe
    "C:\Users\Admin\AppData\Local\Temp\19eba0d44e1fa574d3772d7e3ea3a5fffd4544f8dc9012af87531b6a2302eb00.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8955911.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8955911.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4737197.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4737197.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6956050.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6956050.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2856113.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2856113.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:488
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9488654.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9488654.exe
              6⤵
              • Executes dropped EXE
              PID:2548
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9306264.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9306264.exe
              6⤵
              • Executes dropped EXE
              PID:3836

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8955911.exe

          Filesize

          723KB

          MD5

          f941b511cc10488389d8b00eae5c03fd

          SHA1

          c4d2ab3bdd681a6ac836f6194a3e37b40f75a9af

          SHA256

          75ae8797793213833b72dbea7b5813ef36ac084211a7a22a0e61bb8a2028f31b

          SHA512

          e3441d83d8dd2dc434d7847edae034e7b1dc3f4c343522312ef01a01fde9e27cd57e459f664b52f5f5a55490a4ce6c4a81cb33b784b94fda85f276ab581edeb2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8955911.exe

          Filesize

          723KB

          MD5

          f941b511cc10488389d8b00eae5c03fd

          SHA1

          c4d2ab3bdd681a6ac836f6194a3e37b40f75a9af

          SHA256

          75ae8797793213833b72dbea7b5813ef36ac084211a7a22a0e61bb8a2028f31b

          SHA512

          e3441d83d8dd2dc434d7847edae034e7b1dc3f4c343522312ef01a01fde9e27cd57e459f664b52f5f5a55490a4ce6c4a81cb33b784b94fda85f276ab581edeb2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4737197.exe

          Filesize

          599KB

          MD5

          9cf27d45e02e440bc8d6a883dd2df8fc

          SHA1

          455645fd2cb935250b3568004bac6afffa95afc4

          SHA256

          929585d6021c337da1871d6917a952d5d7657d2e2bf7ca967df26c5640c20985

          SHA512

          938cc552cb6c3137b66063948f7a0a7f41f7eb981ab5ed107ee076aff2ab36498a9e899864a8d8484cd1abe4ac5a1bbd7eb877a150343b78becb12cb2a6c7ac9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4737197.exe

          Filesize

          599KB

          MD5

          9cf27d45e02e440bc8d6a883dd2df8fc

          SHA1

          455645fd2cb935250b3568004bac6afffa95afc4

          SHA256

          929585d6021c337da1871d6917a952d5d7657d2e2bf7ca967df26c5640c20985

          SHA512

          938cc552cb6c3137b66063948f7a0a7f41f7eb981ab5ed107ee076aff2ab36498a9e899864a8d8484cd1abe4ac5a1bbd7eb877a150343b78becb12cb2a6c7ac9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6956050.exe

          Filesize

          373KB

          MD5

          f71b0abd4f616c8b7f3c56fb2d93c489

          SHA1

          19788a57adf6fffbb71172e5e59375e095e89428

          SHA256

          31a4a93a33588e3cc4d2059c50badb24b933fdbe223204b3ec7aaf58138fd5b2

          SHA512

          92a999441bd912d4c72c8a468d5239db234b82b541b8c4416fa3630b96b240e61ecbb946580a35e07cfc18e7e1750bd8b90e8add1764274a9a42ec48d46ed2ec

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6956050.exe

          Filesize

          373KB

          MD5

          f71b0abd4f616c8b7f3c56fb2d93c489

          SHA1

          19788a57adf6fffbb71172e5e59375e095e89428

          SHA256

          31a4a93a33588e3cc4d2059c50badb24b933fdbe223204b3ec7aaf58138fd5b2

          SHA512

          92a999441bd912d4c72c8a468d5239db234b82b541b8c4416fa3630b96b240e61ecbb946580a35e07cfc18e7e1750bd8b90e8add1764274a9a42ec48d46ed2ec

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2856113.exe

          Filesize

          272KB

          MD5

          119e247646697ad8bb6e7f39d1f1a374

          SHA1

          7b445b3e700dbc1af85f0ffae495e6ed4b06d130

          SHA256

          90533d012899fff7ef7a300cf4114d1e63aabc52415404298926625cbad5358e

          SHA512

          cf0b386a0ba5313183d215f188c3456520033a4e5cf624fa7c7d2fa7f7684e28eb03bdadb080fc504e8349f29d1727adc79f968efe5731054b7a3fc228032a77

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2856113.exe

          Filesize

          272KB

          MD5

          119e247646697ad8bb6e7f39d1f1a374

          SHA1

          7b445b3e700dbc1af85f0ffae495e6ed4b06d130

          SHA256

          90533d012899fff7ef7a300cf4114d1e63aabc52415404298926625cbad5358e

          SHA512

          cf0b386a0ba5313183d215f188c3456520033a4e5cf624fa7c7d2fa7f7684e28eb03bdadb080fc504e8349f29d1727adc79f968efe5731054b7a3fc228032a77

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9488654.exe

          Filesize

          140KB

          MD5

          996d1beb2364bfcc4e268fecb495ce8d

          SHA1

          2f2ab0cf7336407e23a195e88c5a591f9a34af2b

          SHA256

          b1606e1f0a89927c61b2c0b4fa311313eec6df17038aac8ca8beb7b58c00d981

          SHA512

          66b22250ba63c4613f28d0f93699aa9c9954acb824ab5c17a331ecd4cb836e6530c516a47456e36b6650ac9abeca685011539643acc5398f23546cd56d57a111

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9488654.exe

          Filesize

          140KB

          MD5

          996d1beb2364bfcc4e268fecb495ce8d

          SHA1

          2f2ab0cf7336407e23a195e88c5a591f9a34af2b

          SHA256

          b1606e1f0a89927c61b2c0b4fa311313eec6df17038aac8ca8beb7b58c00d981

          SHA512

          66b22250ba63c4613f28d0f93699aa9c9954acb824ab5c17a331ecd4cb836e6530c516a47456e36b6650ac9abeca685011539643acc5398f23546cd56d57a111

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9306264.exe

          Filesize

          174KB

          MD5

          d6697deb3ae5b7fb32f56cbe43452459

          SHA1

          8e580e96222a22c2b5016be25a034f6e011c5e78

          SHA256

          fb2fd350a95db5d37f97c78da3386e8d7d31d4ce43122f9f030a3c3d20542a53

          SHA512

          020c9c9e9e5ac912d42d982871df494cce3d550b860da2eccf6e25ab5e4c7a8d77a924394a94f76a6cbc05ed506b91738832788804d06b7033e4cd49258c3ed1

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9306264.exe

          Filesize

          174KB

          MD5

          d6697deb3ae5b7fb32f56cbe43452459

          SHA1

          8e580e96222a22c2b5016be25a034f6e011c5e78

          SHA256

          fb2fd350a95db5d37f97c78da3386e8d7d31d4ce43122f9f030a3c3d20542a53

          SHA512

          020c9c9e9e5ac912d42d982871df494cce3d550b860da2eccf6e25ab5e4c7a8d77a924394a94f76a6cbc05ed506b91738832788804d06b7033e4cd49258c3ed1

        • memory/3836-171-0x00000000740F0000-0x00000000748A0000-memory.dmp

          Filesize

          7.7MB

        • memory/3836-172-0x00000000001C0000-0x00000000001F0000-memory.dmp

          Filesize

          192KB

        • memory/3836-173-0x000000000A500000-0x000000000AB18000-memory.dmp

          Filesize

          6.1MB

        • memory/3836-174-0x000000000A030000-0x000000000A13A000-memory.dmp

          Filesize

          1.0MB

        • memory/3836-175-0x0000000004A50000-0x0000000004A60000-memory.dmp

          Filesize

          64KB

        • memory/3836-176-0x0000000009F70000-0x0000000009F82000-memory.dmp

          Filesize

          72KB

        • memory/3836-177-0x0000000009FD0000-0x000000000A00C000-memory.dmp

          Filesize

          240KB

        • memory/3836-178-0x00000000740F0000-0x00000000748A0000-memory.dmp

          Filesize

          7.7MB

        • memory/3836-179-0x0000000004A50000-0x0000000004A60000-memory.dmp

          Filesize

          64KB