Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2023 12:26

General

  • Target

    0x0006000000016c84-58.exe

  • Size

    173KB

  • MD5

    788b5a65b0956cdb87f4af7b299ec41b

  • SHA1

    55e07a7f05d2d168c0efba53818e5f4477eb8f3f

  • SHA256

    1aab3ba02acf2fd774e4514bdd6565bb61146b3049c764c5e9e39b06dc30f20f

  • SHA512

    28e050bb1782180560a01877324752178ef538361658740ac29786a4f03d16db7e690ba263cfd1e27da423bea1fd3da118b6f10ab3f9637837767754aa6a0ce8

  • SSDEEP

    3072:dZIsEt70Y4jI0iQ9/xOc0hqdRBDtsaE0GMW5owC+CJ38e8h8:dZIVtKjI0iQ9/9RYaE0kowC+CB

Malware Config

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0006000000016c84-58.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0006000000016c84-58.exe"
    1⤵
      PID:4000

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4000-0-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/4000-1-0x0000000000B60000-0x0000000000B90000-memory.dmp

      Filesize

      192KB

    • memory/4000-2-0x0000000005C10000-0x0000000006228000-memory.dmp

      Filesize

      6.1MB

    • memory/4000-3-0x0000000005700000-0x000000000580A000-memory.dmp

      Filesize

      1.0MB

    • memory/4000-5-0x00000000055F0000-0x0000000005602000-memory.dmp

      Filesize

      72KB

    • memory/4000-4-0x00000000055E0000-0x00000000055F0000-memory.dmp

      Filesize

      64KB

    • memory/4000-6-0x0000000005650000-0x000000000568C000-memory.dmp

      Filesize

      240KB

    • memory/4000-7-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/4000-8-0x00000000055E0000-0x00000000055F0000-memory.dmp

      Filesize

      64KB