Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2023 04:09

General

  • Target

    7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe

  • Size

    956KB

  • MD5

    6faf4c7caaf08d52f80818c863945711

  • SHA1

    488fdeed0b6840cc4ef7b9090b0cfe801a3e1432

  • SHA256

    7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b

  • SHA512

    cdc357dc067c6946686430a37f39d8ac456b6f6a138df6fac393ca4b4f67d461bedac0d239647e6d51b450fdd7eaa35b8bc362a3545fdeae97107a0de1b77f98

  • SSDEEP

    24576:KypyzTXzf4vX95Y3asQiBjKObSpKDermPo3:RCTLD37QiBj72cSgo

Malware Config

Extracted

Family

redline

Botnet

dugin

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c3e46e091100fd26a6076996d374c28

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe
    "C:\Users\Admin\AppData\Local\Temp\7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3479285.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3479285.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0546535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0546535.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1019440.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1019440.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1787052.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1787052.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3216
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1675763.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1675763.exe
              6⤵
              • Executes dropped EXE
              PID:3800
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3377622.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3377622.exe
              6⤵
              • Executes dropped EXE
              PID:3428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3479285.exe

    Filesize

    722KB

    MD5

    26e86bd4564ceff8caafb9d2f164a579

    SHA1

    23ee18b66c46433d7402202959a5ca24b87b2f78

    SHA256

    7dd64336eed3f435d321b84b0167faf5c2f1e8582843f3a9b63ad8e6fcbef4d8

    SHA512

    824b721a4e33c27f736410982004ad62a6602f581cb1f268c1849b9189abfd078f5f56bccb0731aa8322b157f0ab749312f46cd5adc6f30686150cc56d30da44

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3479285.exe

    Filesize

    722KB

    MD5

    26e86bd4564ceff8caafb9d2f164a579

    SHA1

    23ee18b66c46433d7402202959a5ca24b87b2f78

    SHA256

    7dd64336eed3f435d321b84b0167faf5c2f1e8582843f3a9b63ad8e6fcbef4d8

    SHA512

    824b721a4e33c27f736410982004ad62a6602f581cb1f268c1849b9189abfd078f5f56bccb0731aa8322b157f0ab749312f46cd5adc6f30686150cc56d30da44

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0546535.exe

    Filesize

    598KB

    MD5

    6797ba6bb183ae1d8c6eb0d6d437c2f7

    SHA1

    23f066c9cec8ed89b47d8bf75c39c5fec0c551a4

    SHA256

    d738237b1b864f4421cc0184734cfa3bbe6fee3b2f832696284d61a42b8c560c

    SHA512

    fb7c33be7d3fea1e0f6dc199c2c2ea230584b581aea12ddd7f91869ee2baa5b0d74f7544e1e0c4d601f064b6eac391c2f69a8a95ba142b9ff461d89edeb93c4d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0546535.exe

    Filesize

    598KB

    MD5

    6797ba6bb183ae1d8c6eb0d6d437c2f7

    SHA1

    23f066c9cec8ed89b47d8bf75c39c5fec0c551a4

    SHA256

    d738237b1b864f4421cc0184734cfa3bbe6fee3b2f832696284d61a42b8c560c

    SHA512

    fb7c33be7d3fea1e0f6dc199c2c2ea230584b581aea12ddd7f91869ee2baa5b0d74f7544e1e0c4d601f064b6eac391c2f69a8a95ba142b9ff461d89edeb93c4d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1019440.exe

    Filesize

    372KB

    MD5

    39de27ad39847d967686633a506f2f1a

    SHA1

    6bc221e8e99a1f336a9fe5f8e7eaa84eccb01ea6

    SHA256

    fb3f3a33c69469e5f1ca6d2a5cbd3068d2b67b08ac3995007cc0bd710ca196b2

    SHA512

    c9543c5f223b9eaf020626e60cf6396e569d27d0d50dd9c5ced7a7ab13e4bb909603b79da07c970c79b1c6d95a69a4c7989d7fc932107b1f45282a86335146b8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1019440.exe

    Filesize

    372KB

    MD5

    39de27ad39847d967686633a506f2f1a

    SHA1

    6bc221e8e99a1f336a9fe5f8e7eaa84eccb01ea6

    SHA256

    fb3f3a33c69469e5f1ca6d2a5cbd3068d2b67b08ac3995007cc0bd710ca196b2

    SHA512

    c9543c5f223b9eaf020626e60cf6396e569d27d0d50dd9c5ced7a7ab13e4bb909603b79da07c970c79b1c6d95a69a4c7989d7fc932107b1f45282a86335146b8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1787052.exe

    Filesize

    271KB

    MD5

    2eacbecf6d1b17ce99a52a94661b6476

    SHA1

    e7001cb599706bd46d0f5a16bccbb018d6dc85af

    SHA256

    4283e285e59272b555ec2f2611740a09f5f7f945161cd2af319a1d2702ca2e95

    SHA512

    8d3ad0ab37f2b7e805d23b466742491e021e7c3960f9cf56b54917ce9391c5487ef1bd2fd94d5df63ff9721faedaa4671f1aa235b497030a817620f8708554b6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1787052.exe

    Filesize

    271KB

    MD5

    2eacbecf6d1b17ce99a52a94661b6476

    SHA1

    e7001cb599706bd46d0f5a16bccbb018d6dc85af

    SHA256

    4283e285e59272b555ec2f2611740a09f5f7f945161cd2af319a1d2702ca2e95

    SHA512

    8d3ad0ab37f2b7e805d23b466742491e021e7c3960f9cf56b54917ce9391c5487ef1bd2fd94d5df63ff9721faedaa4671f1aa235b497030a817620f8708554b6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1675763.exe

    Filesize

    140KB

    MD5

    77a93a6afb1d7fa81c674cbecbee8531

    SHA1

    fbd5275cea45278e48c3306c5e069619cdf038b3

    SHA256

    0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

    SHA512

    dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1675763.exe

    Filesize

    140KB

    MD5

    77a93a6afb1d7fa81c674cbecbee8531

    SHA1

    fbd5275cea45278e48c3306c5e069619cdf038b3

    SHA256

    0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

    SHA512

    dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3377622.exe

    Filesize

    173KB

    MD5

    d5f3785f09b0b4ddb516cb1bba85a36d

    SHA1

    978b0c33233c9ab63a596cbb282473f1e99b07d4

    SHA256

    64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

    SHA512

    40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3377622.exe

    Filesize

    173KB

    MD5

    d5f3785f09b0b4ddb516cb1bba85a36d

    SHA1

    978b0c33233c9ab63a596cbb282473f1e99b07d4

    SHA256

    64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

    SHA512

    40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

  • memory/3428-171-0x0000000000E60000-0x0000000000E90000-memory.dmp

    Filesize

    192KB

  • memory/3428-172-0x0000000074400000-0x0000000074BB0000-memory.dmp

    Filesize

    7.7MB

  • memory/3428-173-0x000000000B2E0000-0x000000000B8F8000-memory.dmp

    Filesize

    6.1MB

  • memory/3428-174-0x000000000AE10000-0x000000000AF1A000-memory.dmp

    Filesize

    1.0MB

  • memory/3428-176-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB

  • memory/3428-175-0x000000000AD50000-0x000000000AD62000-memory.dmp

    Filesize

    72KB

  • memory/3428-177-0x000000000ADB0000-0x000000000ADEC000-memory.dmp

    Filesize

    240KB

  • memory/3428-178-0x0000000074400000-0x0000000074BB0000-memory.dmp

    Filesize

    7.7MB

  • memory/3428-179-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB