Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 05:15

General

  • Target

    x2733357.exe

  • Size

    594KB

  • MD5

    43cfec718a4703e00d0351d187333cbf

  • SHA1

    71823b547c4d778b2f326b7186f7e1211a711e9e

  • SHA256

    8aa9a29f7f7d80b3d5bb98ba955215648e4cecd69b07aac93f0855faef4f3b0f

  • SHA512

    85f01bbacf3a7066dbc65cd244e69aeb466160dc4aacc32ee529317c5c44a41aec340786924289546b32e0a156cdf7ade8cad4379e10299ad9d7c448782062f9

  • SSDEEP

    12288:VMrhy90J1MRWFQQeEbj3GeSiX+gdRurjSgb:gyY1vFtjWeVHOiW

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x2733357.exe
    "C:\Users\Admin\AppData\Local\Temp\x2733357.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0543664.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0543664.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8131180.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8131180.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0543664.exe

    Filesize

    291KB

    MD5

    d72e8eb9bc5f8e9b119f39216631733b

    SHA1

    d8e29c1d02381d7339910f4f0aed1e0fc4e9fea9

    SHA256

    6508ea148ad32be86b59cadc266e2a72343e0dc3896742fd74bc324cb1a5ef57

    SHA512

    9b3a3188b794d03302d6657c834fcfa45d008a402e426afa36f17e28b8d20bbfc3d7a597e9d03e633f23db638751b40de90c3914882779d5da7bd0b902c8aa74

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0543664.exe

    Filesize

    291KB

    MD5

    d72e8eb9bc5f8e9b119f39216631733b

    SHA1

    d8e29c1d02381d7339910f4f0aed1e0fc4e9fea9

    SHA256

    6508ea148ad32be86b59cadc266e2a72343e0dc3896742fd74bc324cb1a5ef57

    SHA512

    9b3a3188b794d03302d6657c834fcfa45d008a402e426afa36f17e28b8d20bbfc3d7a597e9d03e633f23db638751b40de90c3914882779d5da7bd0b902c8aa74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8131180.exe

    Filesize

    174KB

    MD5

    ac0b8c45614a0b94074d9f7a4cc76f38

    SHA1

    240b5d17766503fd7dfa2a7f8f05be2f7857dc8a

    SHA256

    d7aa1acf2186822f215379df2f4731a9502aa6802dd8f4c87431e68ffb82fc74

    SHA512

    70abd5c774de1df94d4f89f6fc16734012135b1bab6c21f00da133c5f8194941f4bf118c449b8dd02ac087ff729bca63227140c56bebdaa7cefba560866ebff4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8131180.exe

    Filesize

    174KB

    MD5

    ac0b8c45614a0b94074d9f7a4cc76f38

    SHA1

    240b5d17766503fd7dfa2a7f8f05be2f7857dc8a

    SHA256

    d7aa1acf2186822f215379df2f4731a9502aa6802dd8f4c87431e68ffb82fc74

    SHA512

    70abd5c774de1df94d4f89f6fc16734012135b1bab6c21f00da133c5f8194941f4bf118c449b8dd02ac087ff729bca63227140c56bebdaa7cefba560866ebff4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0543664.exe

    Filesize

    291KB

    MD5

    d72e8eb9bc5f8e9b119f39216631733b

    SHA1

    d8e29c1d02381d7339910f4f0aed1e0fc4e9fea9

    SHA256

    6508ea148ad32be86b59cadc266e2a72343e0dc3896742fd74bc324cb1a5ef57

    SHA512

    9b3a3188b794d03302d6657c834fcfa45d008a402e426afa36f17e28b8d20bbfc3d7a597e9d03e633f23db638751b40de90c3914882779d5da7bd0b902c8aa74

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0543664.exe

    Filesize

    291KB

    MD5

    d72e8eb9bc5f8e9b119f39216631733b

    SHA1

    d8e29c1d02381d7339910f4f0aed1e0fc4e9fea9

    SHA256

    6508ea148ad32be86b59cadc266e2a72343e0dc3896742fd74bc324cb1a5ef57

    SHA512

    9b3a3188b794d03302d6657c834fcfa45d008a402e426afa36f17e28b8d20bbfc3d7a597e9d03e633f23db638751b40de90c3914882779d5da7bd0b902c8aa74

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\h8131180.exe

    Filesize

    174KB

    MD5

    ac0b8c45614a0b94074d9f7a4cc76f38

    SHA1

    240b5d17766503fd7dfa2a7f8f05be2f7857dc8a

    SHA256

    d7aa1acf2186822f215379df2f4731a9502aa6802dd8f4c87431e68ffb82fc74

    SHA512

    70abd5c774de1df94d4f89f6fc16734012135b1bab6c21f00da133c5f8194941f4bf118c449b8dd02ac087ff729bca63227140c56bebdaa7cefba560866ebff4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\h8131180.exe

    Filesize

    174KB

    MD5

    ac0b8c45614a0b94074d9f7a4cc76f38

    SHA1

    240b5d17766503fd7dfa2a7f8f05be2f7857dc8a

    SHA256

    d7aa1acf2186822f215379df2f4731a9502aa6802dd8f4c87431e68ffb82fc74

    SHA512

    70abd5c774de1df94d4f89f6fc16734012135b1bab6c21f00da133c5f8194941f4bf118c449b8dd02ac087ff729bca63227140c56bebdaa7cefba560866ebff4

  • memory/2708-20-0x00000000011C0000-0x00000000011F0000-memory.dmp

    Filesize

    192KB

  • memory/2708-21-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB