Analysis

  • max time kernel
    290s
  • max time network
    308s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-10-2023 00:59

General

  • Target

    2eN413xe.exe

  • Size

    231KB

  • MD5

    7103d61fbf7180d11d535e3d90e2518a

  • SHA1

    c22e345a3963dc513f7c3d3693ee4b1c81d59f19

  • SHA256

    8aabb6e40f0a02910291c6ddd179426014ddd2f38384659b0644e174dd3d6ac2

  • SHA512

    8207706e8f70841bd34b5b924724fbdee603d1799b0f1ede99e0d74f805a824fb8039986037ed1148bc0aab9f8f7a84653a3a0d5eb7fcc35d681dc6168c71a4c

  • SSDEEP

    3072:sgspAnCNgcepupXKLh8DjV7OGt/qasDrTv+mIqd44oKG6g:jOACNgceQpXKLKdr/ODrTmmpd44oK

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eN413xe.exe
    "C:\Users\Admin\AppData\Local\Temp\2eN413xe.exe"
    1⤵
      PID:2068

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2068-0-0x0000000000B20000-0x0000000000B5E000-memory.dmp
      Filesize

      248KB

    • memory/2068-1-0x0000000073F90000-0x000000007467E000-memory.dmp
      Filesize

      6.9MB

    • memory/2068-2-0x0000000007D20000-0x000000000821E000-memory.dmp
      Filesize

      5.0MB

    • memory/2068-3-0x00000000078C0000-0x0000000007952000-memory.dmp
      Filesize

      584KB

    • memory/2068-4-0x0000000007AC0000-0x0000000007AD0000-memory.dmp
      Filesize

      64KB

    • memory/2068-5-0x0000000007880000-0x000000000788A000-memory.dmp
      Filesize

      40KB

    • memory/2068-6-0x0000000008830000-0x0000000008E36000-memory.dmp
      Filesize

      6.0MB

    • memory/2068-7-0x0000000007BE0000-0x0000000007CEA000-memory.dmp
      Filesize

      1.0MB

    • memory/2068-8-0x0000000007AF0000-0x0000000007B02000-memory.dmp
      Filesize

      72KB

    • memory/2068-9-0x0000000007B50000-0x0000000007B8E000-memory.dmp
      Filesize

      248KB

    • memory/2068-10-0x0000000007B90000-0x0000000007BDB000-memory.dmp
      Filesize

      300KB

    • memory/2068-11-0x0000000073F90000-0x000000007467E000-memory.dmp
      Filesize

      6.9MB

    • memory/2068-12-0x0000000007AC0000-0x0000000007AD0000-memory.dmp
      Filesize

      64KB