Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2023, 14:35 UTC

General

  • Target

    file.exe

  • Size

    1.3MB

  • MD5

    1ce53a6aa068aee91e137ddd8dc6d205

  • SHA1

    07676384b7f5ea40ee1dc628086af4bb92109101

  • SHA256

    2885c075025d864d3b77b91bd576e9d5fe83070ad742f31c27acc07bd3fb9955

  • SHA512

    0a9b91f38f1c3749916af5da9116fa98e6fdd7a4b8d14a53ce5ca4c968e68ba817bfc2d8535f7ff506bb44e67b0a35eb6fcd1ed4848add24dea53152829a4e72

  • SSDEEP

    24576:Lg1yLp0HmYObxpsiuw/88zk7sEI5tq96:cxHmYObkYvps

Malware Config

Extracted

Family

redline

Botnet

1006

C2

176.123.9.142:14845

Attributes
  • auth_value

    b5da80860b093905c2bba6f9377af704

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1180

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    69.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    69.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    126.21.238.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    126.21.238.8.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.154.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.154.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    41.110.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    41.110.16.96.in-addr.arpa
    IN PTR
    Response
    41.110.16.96.in-addr.arpa
    IN PTR
    a96-16-110-41deploystaticakamaitechnologiescom
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    142.9.123.176.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    142.9.123.176.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    254.22.238.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    254.22.238.8.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    208.143.182.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    208.143.182.52.in-addr.arpa
    IN PTR
    Response
  • 176.123.9.142:14845
    vbc.exe
    1.4MB
    20.8kB
    1035
    360
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    69.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    69.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    126.21.238.8.in-addr.arpa
    dns
    71 B
    125 B
    1
    1

    DNS Request

    126.21.238.8.in-addr.arpa

  • 8.8.8.8:53
    241.154.82.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.154.82.20.in-addr.arpa

  • 8.8.8.8:53
    41.110.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    41.110.16.96.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    142.9.123.176.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    142.9.123.176.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    254.22.238.8.in-addr.arpa
    dns
    71 B
    125 B
    1
    1

    DNS Request

    254.22.238.8.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    208.143.182.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    208.143.182.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1180-14-0x0000000005050000-0x000000000508C000-memory.dmp

    Filesize

    240KB

  • memory/1180-15-0x00000000051D0000-0x000000000521C000-memory.dmp

    Filesize

    304KB

  • memory/1180-2-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1180-26-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/1180-8-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/1180-9-0x0000000002990000-0x0000000002996000-memory.dmp

    Filesize

    24KB

  • memory/1180-10-0x00000000055D0000-0x0000000005BE8000-memory.dmp

    Filesize

    6.1MB

  • memory/1180-11-0x00000000050C0000-0x00000000051CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1180-12-0x0000000004FF0000-0x0000000005002000-memory.dmp

    Filesize

    72KB

  • memory/1180-16-0x0000000005360000-0x00000000053D6000-memory.dmp

    Filesize

    472KB

  • memory/1180-24-0x0000000007860000-0x0000000007D8C000-memory.dmp

    Filesize

    5.2MB

  • memory/1180-23-0x0000000006C40000-0x0000000006E02000-memory.dmp

    Filesize

    1.8MB

  • memory/1180-13-0x00000000029B0000-0x00000000029C0000-memory.dmp

    Filesize

    64KB

  • memory/1180-17-0x0000000005480000-0x0000000005512000-memory.dmp

    Filesize

    584KB

  • memory/1180-18-0x0000000006690000-0x0000000006C34000-memory.dmp

    Filesize

    5.6MB

  • memory/1180-19-0x0000000005520000-0x0000000005586000-memory.dmp

    Filesize

    408KB

  • memory/1180-20-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/1180-21-0x00000000029B0000-0x00000000029C0000-memory.dmp

    Filesize

    64KB

  • memory/1180-22-0x00000000062E0000-0x0000000006330000-memory.dmp

    Filesize

    320KB

  • memory/1592-0-0x00000000008D0000-0x0000000000A78000-memory.dmp

    Filesize

    1.7MB

  • memory/1592-1-0x00000000008D0000-0x0000000000A78000-memory.dmp

    Filesize

    1.7MB

  • memory/1592-7-0x00000000008D0000-0x0000000000A78000-memory.dmp

    Filesize

    1.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.