Analysis

  • max time kernel
    197s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:43

General

  • Target

    2b159c6931ed9c1687fbbf393f91514bdb88303f1ebda6b811892faa443f3cd3.exe

  • Size

    4.5MB

  • MD5

    0508858aafafa001652f27d51ed4872b

  • SHA1

    9ebb76c1a19a48026879e136cded97c41f90296e

  • SHA256

    2b159c6931ed9c1687fbbf393f91514bdb88303f1ebda6b811892faa443f3cd3

  • SHA512

    277827eb0e7adb7534c6236353047c21f2806b3fe08e9d876d5d0bef0f944ba4a94bfd210ccb24fd517a326b4f4e4e543d6b8ebef245f665434e8322aea2c74f

  • SSDEEP

    98304:fzqKcOaPwmZKAO0Cin1VvuJi0Q4vu7ZxI3Jyuq+L/Y:fSH1ESZxEUuq+L/Y

Malware Config

Extracted

Family

redline

Botnet

installs

C2

77.91.124.151:44308

Attributes
  • auth_value

    6c50f1496dfd731fc870239105cea8e4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b159c6931ed9c1687fbbf393f91514bdb88303f1ebda6b811892faa443f3cd3.exe
    "C:\Users\Admin\AppData\Local\Temp\2b159c6931ed9c1687fbbf393f91514bdb88303f1ebda6b811892faa443f3cd3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2b159c6931ed9c1687fbbf393f91514bdb88303f1ebda6b811892faa443f3cd3.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe5c5fe034f0e6ee90c47e668528031b

    SHA1

    cc8c0437fba1fd97147a82f52a54ea74c732e2b8

    SHA256

    0f528e8dfbf1dea8537e32359c2dfea367c8a27b765ca4136d9c1ae3b47df5ad

    SHA512

    467701841e73d0b29d28af2a13e37707c6d71de0068c11b67f17f192b84bf5bea0cf547add4084ed9fb5a13d6c3c832eed5ffa5482d857ec60240048b46566c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc602eab3f83a1083b46c03b40b85337

    SHA1

    612e8640f8382691e781ce4557d0f8f3856a0350

    SHA256

    4677b5a1681f0109809a809434b157c5dd2bd322c683f98f30469a784fbf0511

    SHA512

    868aa0682069ff4b2c229e6cba4a324a4dc257f8fbaa3329f24421bfc39dedb7a1fe66c388384bb9fad4873577bd666cf59ba8cf0ef0b3fc2839b0d639185c6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09a0d2b76e8b1c7163ec1bc38f704303

    SHA1

    0981f9e28f6a3bfa93c93881e1b98c15fc69c5e4

    SHA256

    fd99633e5215ec5c2fe6e061852d9119cbc356ce06c5bb28de785303762e7c95

    SHA512

    d4ef58c2678a0bf61995b8767650beba39304ee4763dfe3d7ef1b3e363ac2a44a8274542927ef3636a0a06a677ef112b524c5ad19976eb14c550fb6bd24a18e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e6d3cc73ec7e8dbe75463a706e98b9c

    SHA1

    5992c4a55a71771d11f16804f1173602427d15e7

    SHA256

    1e621385495fa912e0fd66ae671dc36c5ada071c09bc1235da45462fb97b3656

    SHA512

    61781b6accd683446ad315d7d8593f1ffcc1e7f4d55c77dc8c303b42c26d49cd99fa0158a6cb4e5f904e94eb98533231eeb25e08eea563c82b5df27a552f4179

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0072dad42b55fee116d48fdc59a08cc6

    SHA1

    eb9b253a621dabd5d297081b9086db150f571fd3

    SHA256

    1af3658325ff184f5684c5b486d8afd781417269e1f4f652064485c1934e406e

    SHA512

    91b857c990406519f4a7a8a8a9606036a0aaf10829d806770d669df1c2a85b2e79d5da44a53be14a86e2d76834ff85ec82abd8bc67142d7562b4a49f6fa87624

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    267ecff1901001d0b107fd7fe054c8f7

    SHA1

    5549ed5d4028ec3c1aae4c369afc3e1ad047978b

    SHA256

    259f01f677816c1602635e0d54c351f0df7731d4b091fb96787803c78174c52d

    SHA512

    e739601862d6840d2a543ad926210d6ff75d8bc58395d59ac5ba12c22d5a053d0375701f02a4b16b87e8db7f97279c918ff67abcf9bce48366774e914dc10fc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b81607f88297050eb03de510aeec4dfb

    SHA1

    36d8e31c439007390c966ec0b3883c015d9cb103

    SHA256

    61713535f3c4d66da95dc11f03b56eff93a3374c00b50424167789237a6a7fa5

    SHA512

    44c29632e010c5af2f43aac1eb6218895c5301c507fc760b2cb3e252e5f0387655587e3a6a610143a9758debb039d605678971da53cc32545c71e8cf0e42b042

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df068111cb3cf28c29b2d95435fbbe00

    SHA1

    caa1166a9041c8481bba51055dc8d620d71145a2

    SHA256

    286b8be34b9713fa77d70f87705bec4b63b3477069e8d6e2596302d20e93d365

    SHA512

    966a33067a338364e7f870182bd7e030efd52ab6e2151d6b6d15820ff1f53b67a0bfa44159c89b1fec7482dbaef125295c588398278f5d6fd5e747fd968a0167

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6a6e3901bf83245e9847ff3f08b897f

    SHA1

    18811ec3b467f34716206c672466036158d1223f

    SHA256

    83aa7b382aef959f35c015fe47e271fc7e112bd037f8e4db0c39515b2f8364ba

    SHA512

    910ae491745ce9f411695304cbf2035d7700d797d0e6dc8b6be03f1c59738b2246fc00fd18a2bef1c0a347f7bf0f719868ee897562a80594a61f1404c0200950

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1828279f3088583e76b56d02cc576e7

    SHA1

    080dff8364f05fe6b8c0303c5a0465f5e86103bc

    SHA256

    3c2ab21fb0400a87e720947677d2cffd36afeebe264894de389dd073c5ea9931

    SHA512

    9c781bb74814d541f07b579ee21127e8885a0ad4a2965645a4e117b69d60c8b54c13ac86bdfa8efea2e5468947d20565005d6f10809909bc4fa038082761bc7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06bb908b6bb9d9cf9d5ce8eb1981b9c4

    SHA1

    53b32c9ce244d75d21c1cdd21c6e2e96874e0de4

    SHA256

    b85741137a190fac3ce45738ea84033444350abfed88e0887f1d0b0e790a6a79

    SHA512

    1fafbed4f5ac0c4ee3a5810e114d15de5d06a79b670d9b5034edaa1f7cd44f212fd5f96848fbc3ced67bb50a4e107584c87b20cda423d4c2c35a705fd2987363

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf0dba9589ecb65660cc0f28bfdb6e66

    SHA1

    8c8c990c41434f250ae058c5c3e9225babafde87

    SHA256

    3f2c0bee340caf38efc9f26b2d270a34e3943a0f6f3f349500f4b918a836b60b

    SHA512

    a576500c2190929fe99f82a7e4a8a519d59dc1b1f55bbea081f80986a1a5cb81ccf121d49f156daa8c2486453de049202d27cdfffb2044de7464ab9969b37be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cd9c7d821916e67e3a981c4231a0213d

    SHA1

    b9915ad68d3058b6265f3919b2f7c650bc69e949

    SHA256

    a7b7b3e91cef93b5506f9ca5ff344dc8c15dff5491d144795e3d235366813a1a

    SHA512

    c463830ec16ca8c3fb41f675a8308ad7f90c6df9dc9533b987968cd4f60c7f0d4a3bf495d37083a2b8702de178341346072025d7416e0622cfcadcbb8b63e0b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e96e4648c4c98e970e58ea1be7aff49b

    SHA1

    8567aae6e926e34e174b0a892edb635f19dd930a

    SHA256

    7eb0c02c8f0386338e006f1bc34b74d4827a50589fc5689054af020fd6334197

    SHA512

    3efe3386f938bb68c69f44d0bd7c688939717b70a839ed6fe7a9fe39806b5b0b412ed25fe851787a23874b6e9418d98ebf03b11c3daf17cf21c4289a79f4959a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ee1185c5eaf3b0cccebe8a11bf6cd02

    SHA1

    55b27d87aa4e86eede9504e96e0e70f990afc8af

    SHA256

    6fd1d0799e680107786323f9f45583cac20666e0c75faf2376bd51da17975f8b

    SHA512

    8d94707a30771e2578db50c4462313e2fa6c45a65a2ae2125e0e93a41cb8ae25d68341a9404c94e9477f9195a5393495c3abb967d02504bebd95cd7248519562

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88e03cd37e2664248be9c36faa681082

    SHA1

    07662f8f2e7f6ac7ba46bde2142b9567580df84e

    SHA256

    a7a761db66c456e95ce32040b7b67da5fbc82b46b8132454df76732dc05d1a26

    SHA512

    30d163783a2ab2af2bad4de7bf238c8f6f2314468c40682b202745ddb36ddcf70f319dd7cfeeb2f0629fd084932baf889934d0cd477a06edbf60fc123efd39ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20a8f90c1144835c1e221f2479252651

    SHA1

    f9b85c5f303524c1cb5fe889de304115e0fd87fc

    SHA256

    32c890939780c65af792d3502e28b79504984ff015c51e071da0382b4a1f55d1

    SHA512

    0ce26d6f08b9285f6f72aabd0d33d25edce51cedbfbadc587b285c24cd42d1e22c27dc0579cc7836b0d2ace15156a51effb8edc8ca0b23311f55f950c62fbc46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3dc43158ad17d43695f83cc61e78b83

    SHA1

    9b27f179ce1e462df784c09ac918ab39ff577d8e

    SHA256

    3e00b668389f67e09a04318cc7a825c778da6b2ac165d38ba8f72881d5411fa5

    SHA512

    235401d1b3616469ae23b95177f33d952edbb1eed3a2c4a4771f88d2fcf15a1460848a98d94e12bbedfcec5b17a73ccd49b1354e5e647325088fc4810c8764d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3dc43158ad17d43695f83cc61e78b83

    SHA1

    9b27f179ce1e462df784c09ac918ab39ff577d8e

    SHA256

    3e00b668389f67e09a04318cc7a825c778da6b2ac165d38ba8f72881d5411fa5

    SHA512

    235401d1b3616469ae23b95177f33d952edbb1eed3a2c4a4771f88d2fcf15a1460848a98d94e12bbedfcec5b17a73ccd49b1354e5e647325088fc4810c8764d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0351f0110769e11be25de7413efe090

    SHA1

    db5a43e14e32d77497541d7d1cd3f060a7515c23

    SHA256

    f58545e9a4621744b67217c4f8d9b8cbaabc826766cd2364fa971646ed91a67a

    SHA512

    066d55f98a6e6a13b961686050c616d9414c30fcbf676076bb1d4a921dab283e52d1d4d340a3cd5b93fcd285e52eab4c60e9243470ea5f4b6a0738a87f9d62c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1af368499915f1d8ebe3ae19849beab1

    SHA1

    0f2e16f084650ea50d0099b7dfce662b0db6378b

    SHA256

    1d7556dd457564eafa8f69626ff483e6ddc5239456158292614396bb31ce789a

    SHA512

    2c8bef92ab3b130ecae641222f05a5210bce039e4cbe1d80fb2235d532b240f562629204f83139eea1c713825836e5e7bd556775aec1aeb1b9aed36763443784

  • C:\Users\Admin\AppData\Local\Temp\Cab46B4.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar49A4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2740-4-0x0000000000220000-0x0000000000250000-memory.dmp

    Filesize

    192KB

  • memory/2740-0-0x0000000000400000-0x0000000000ACF000-memory.dmp

    Filesize

    6.8MB

  • memory/2740-5-0x0000000000400000-0x0000000000ACF000-memory.dmp

    Filesize

    6.8MB