Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/08/2023, 04:36

General

  • Target

    ca8e648840b1d9f62168a0d6cab0ea8e1151f7eda316d7ed549c77c85744d6ba.exe

  • Size

    944KB

  • MD5

    6b47dd82516af7976a126f4c624e3fce

  • SHA1

    06d497ac28d37bf8c62c5752bf5d0686569dec76

  • SHA256

    ca8e648840b1d9f62168a0d6cab0ea8e1151f7eda316d7ed549c77c85744d6ba

  • SHA512

    bbc70f4beb5ef1e3949a7bb404223319830775b66481508c9731d3486a081724d81a1fdf028137a2f49637f9f8dc2aefa88ceef9178e9d30047832505c90e81c

  • SSDEEP

    12288:QMriy90TTmYn7VQhBp/Jp7dRltkOVcDzdN54EYobHFGw0IgEf+CaUNemxaokzBxP:iyYD7g/7ROzd8EB0IgY+NUJPkCNXA

Malware Config

Extracted

Family

redline

Botnet

dugin

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c3e46e091100fd26a6076996d374c28

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca8e648840b1d9f62168a0d6cab0ea8e1151f7eda316d7ed549c77c85744d6ba.exe
    "C:\Users\Admin\AppData\Local\Temp\ca8e648840b1d9f62168a0d6cab0ea8e1151f7eda316d7ed549c77c85744d6ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1618359.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1618359.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6485955.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6485955.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8128457.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8128457.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:652
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5479150.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5479150.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4152
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9409323.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9409323.exe
              6⤵
              • Executes dropped EXE
              PID:4272
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5437281.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5437281.exe
              6⤵
              • Executes dropped EXE
              PID:3532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1618359.exe

          Filesize

          711KB

          MD5

          91516e9de2e5ebee646a7f7cdcbb03a7

          SHA1

          739f7665b274f79976d133c7354ceaa1eb51776f

          SHA256

          7857176f59204ec62af2e26dc0c3a941d7204d8f92bd4383a2d16638da5211aa

          SHA512

          ff9188c7b43df2137e1940faf5251b12c2899e12a5626bab3406bc964b56caa287624cb3e84879d7e84c2356fc9c7a04edeb1303b90abe2889a8f31e63a361c3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1618359.exe

          Filesize

          711KB

          MD5

          91516e9de2e5ebee646a7f7cdcbb03a7

          SHA1

          739f7665b274f79976d133c7354ceaa1eb51776f

          SHA256

          7857176f59204ec62af2e26dc0c3a941d7204d8f92bd4383a2d16638da5211aa

          SHA512

          ff9188c7b43df2137e1940faf5251b12c2899e12a5626bab3406bc964b56caa287624cb3e84879d7e84c2356fc9c7a04edeb1303b90abe2889a8f31e63a361c3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6485955.exe

          Filesize

          598KB

          MD5

          3f7e39d651f6e2deb93388bd1dcad7f3

          SHA1

          673c36c74fcacbfa0c955837b71d2fea1cbe5e95

          SHA256

          629fbaf8e40bb924eb74748a8627b34224383952181aa02694fa8f4281579d4b

          SHA512

          c712fbc58ff896850f987d161377e6a46b36b945150f261679c371f696266c379b3484a99406b252c6d94f12c191c2c91f5077e347c2b92f1d771fc004c031e8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6485955.exe

          Filesize

          598KB

          MD5

          3f7e39d651f6e2deb93388bd1dcad7f3

          SHA1

          673c36c74fcacbfa0c955837b71d2fea1cbe5e95

          SHA256

          629fbaf8e40bb924eb74748a8627b34224383952181aa02694fa8f4281579d4b

          SHA512

          c712fbc58ff896850f987d161377e6a46b36b945150f261679c371f696266c379b3484a99406b252c6d94f12c191c2c91f5077e347c2b92f1d771fc004c031e8

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8128457.exe

          Filesize

          372KB

          MD5

          8f50567ef3e83a75e519c18206e82344

          SHA1

          fb41fc610578eb9d65f381d22d7e6e2835070cce

          SHA256

          e0c1d8182ef7a9240662f3081cad4deab2865f6ac543fab0169b935f541d4252

          SHA512

          625bd850795dcfceb515ba3346832ca47d43dcf79288e10beaf272e80d5bb7d7b471cc34efee76c5e8ef931b6ed8b68d4c4e8be9db5805d7ad93011a89d335bc

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8128457.exe

          Filesize

          372KB

          MD5

          8f50567ef3e83a75e519c18206e82344

          SHA1

          fb41fc610578eb9d65f381d22d7e6e2835070cce

          SHA256

          e0c1d8182ef7a9240662f3081cad4deab2865f6ac543fab0169b935f541d4252

          SHA512

          625bd850795dcfceb515ba3346832ca47d43dcf79288e10beaf272e80d5bb7d7b471cc34efee76c5e8ef931b6ed8b68d4c4e8be9db5805d7ad93011a89d335bc

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5479150.exe

          Filesize

          271KB

          MD5

          f3b2635b1722ac23e8bc0145686ce892

          SHA1

          9f8f08302b459ce86d2df90e3ce7f86f2c59bd85

          SHA256

          21845dae44156b511e381d9523666a32bc11499971c0912013488ad70b4738b8

          SHA512

          c993989c43be1450ecb31aa401668d38fd68f9a48cb042b9bad27804f9b235ebbe6d34966b0795484f360dbce9d98e2ea8ab37aaed9f3bb170f92e5ede18b417

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5479150.exe

          Filesize

          271KB

          MD5

          f3b2635b1722ac23e8bc0145686ce892

          SHA1

          9f8f08302b459ce86d2df90e3ce7f86f2c59bd85

          SHA256

          21845dae44156b511e381d9523666a32bc11499971c0912013488ad70b4738b8

          SHA512

          c993989c43be1450ecb31aa401668d38fd68f9a48cb042b9bad27804f9b235ebbe6d34966b0795484f360dbce9d98e2ea8ab37aaed9f3bb170f92e5ede18b417

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9409323.exe

          Filesize

          140KB

          MD5

          77a93a6afb1d7fa81c674cbecbee8531

          SHA1

          fbd5275cea45278e48c3306c5e069619cdf038b3

          SHA256

          0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

          SHA512

          dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9409323.exe

          Filesize

          140KB

          MD5

          77a93a6afb1d7fa81c674cbecbee8531

          SHA1

          fbd5275cea45278e48c3306c5e069619cdf038b3

          SHA256

          0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

          SHA512

          dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5437281.exe

          Filesize

          173KB

          MD5

          d5f3785f09b0b4ddb516cb1bba85a36d

          SHA1

          978b0c33233c9ab63a596cbb282473f1e99b07d4

          SHA256

          64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

          SHA512

          40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5437281.exe

          Filesize

          173KB

          MD5

          d5f3785f09b0b4ddb516cb1bba85a36d

          SHA1

          978b0c33233c9ab63a596cbb282473f1e99b07d4

          SHA256

          64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

          SHA512

          40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

        • memory/3532-155-0x0000000000A40000-0x0000000000A70000-memory.dmp

          Filesize

          192KB

        • memory/3532-156-0x00000000731B0000-0x000000007389E000-memory.dmp

          Filesize

          6.9MB

        • memory/3532-157-0x0000000002BC0000-0x0000000002BC6000-memory.dmp

          Filesize

          24KB

        • memory/3532-158-0x000000000AE60000-0x000000000B466000-memory.dmp

          Filesize

          6.0MB

        • memory/3532-159-0x000000000A990000-0x000000000AA9A000-memory.dmp

          Filesize

          1.0MB

        • memory/3532-160-0x000000000A8C0000-0x000000000A8D2000-memory.dmp

          Filesize

          72KB

        • memory/3532-161-0x000000000A920000-0x000000000A95E000-memory.dmp

          Filesize

          248KB

        • memory/3532-162-0x000000000AAA0000-0x000000000AAEB000-memory.dmp

          Filesize

          300KB

        • memory/3532-163-0x00000000731B0000-0x000000007389E000-memory.dmp

          Filesize

          6.9MB