Analysis

  • max time kernel
    136s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 07:58

General

  • Target

    834f553bf7f862134c46eaf28039323544f129d99f68451f33cc34ff793a17f5.exe

  • Size

    785KB

  • MD5

    b8a316643f3f908f69190f1945424b33

  • SHA1

    0e95c8898a1cb5a78c9405fb7e61c8aa3481eb7c

  • SHA256

    834f553bf7f862134c46eaf28039323544f129d99f68451f33cc34ff793a17f5

  • SHA512

    24387ebabdf57b96dc048f34970562da61a6b70ab93158a1cf364abc8f3fb6c6d00c17742b80495a75e996d7fd727bc75f872db7c9a7ff0d0fe51d17d2a715bf

  • SSDEEP

    12288:IMrmy90RfjIeMkpXga9VweormQkmRHBvp0xzoVQMOdTt+RthhqdW3cOzglM4H6wk:OyGf9MkJgZmBcD0m+jdx0hqAsOzgnnk

Malware Config

Extracted

Family

redline

Botnet

buben

C2

77.91.124.82:19071

Attributes
  • auth_value

    c62fa04aa45f5b78f62d2c21fcbefdec

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\834f553bf7f862134c46eaf28039323544f129d99f68451f33cc34ff793a17f5.exe
    "C:\Users\Admin\AppData\Local\Temp\834f553bf7f862134c46eaf28039323544f129d99f68451f33cc34ff793a17f5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391359.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391359.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4245940.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4245940.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8086837.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8086837.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2768

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391359.exe

          Filesize

          683KB

          MD5

          b3a22540fc405733acba4c71540e94f5

          SHA1

          aacb0adb9a3b5a6f6ecaa20673f0225cb25a3fac

          SHA256

          c2e3127271e3383bf30cdc0e999586664e569f51ebcda95dc1fa7c930d57c77d

          SHA512

          fcdfe5f4e715b607caca04c715c5df900b528695c75b0de68dfba8e095c7315e88ba2dbb5c7d2d219c77f8a16de65e8d4af87b073c439ad9bddf58ed8c11ea2d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391359.exe

          Filesize

          683KB

          MD5

          b3a22540fc405733acba4c71540e94f5

          SHA1

          aacb0adb9a3b5a6f6ecaa20673f0225cb25a3fac

          SHA256

          c2e3127271e3383bf30cdc0e999586664e569f51ebcda95dc1fa7c930d57c77d

          SHA512

          fcdfe5f4e715b607caca04c715c5df900b528695c75b0de68dfba8e095c7315e88ba2dbb5c7d2d219c77f8a16de65e8d4af87b073c439ad9bddf58ed8c11ea2d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4245940.exe

          Filesize

          292KB

          MD5

          7c6098b4c62ae39a2d1a0c72f1dc6faa

          SHA1

          ef9bfabd472a2abe5ad38e08fee6a8ca6688a81b

          SHA256

          b40f45fc9b0561f9710898d2514ef681d8afbdd07281140b75c5c112144e9b5f

          SHA512

          c6421c8b78be73b54e73c6a68e80a3319b918f9dc414c9ff9952589280e7d44fbbf28afb764e288510986ebca350d7a5d99e8c6a70a9587fcf750bf50949898a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4245940.exe

          Filesize

          292KB

          MD5

          7c6098b4c62ae39a2d1a0c72f1dc6faa

          SHA1

          ef9bfabd472a2abe5ad38e08fee6a8ca6688a81b

          SHA256

          b40f45fc9b0561f9710898d2514ef681d8afbdd07281140b75c5c112144e9b5f

          SHA512

          c6421c8b78be73b54e73c6a68e80a3319b918f9dc414c9ff9952589280e7d44fbbf28afb764e288510986ebca350d7a5d99e8c6a70a9587fcf750bf50949898a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8086837.exe

          Filesize

          174KB

          MD5

          7006ba3bf9001fddd656d2bdbbffb4f2

          SHA1

          88003e66c16c69e5dad50b317c980d30dc7e01d4

          SHA256

          6d990c8359c76ac4b4f52c0479460bc29477321cbe42533ea3b5152b5ba3f5f3

          SHA512

          b2df4cde682d46b1f7d7ea0c8027dc0e8ab7f6024adedbf94f396430e6a856a0b667f8e8d4ac70649b59c564e48b3516a8f2d5ae901bc102dfcf0df1a2588c95

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8086837.exe

          Filesize

          174KB

          MD5

          7006ba3bf9001fddd656d2bdbbffb4f2

          SHA1

          88003e66c16c69e5dad50b317c980d30dc7e01d4

          SHA256

          6d990c8359c76ac4b4f52c0479460bc29477321cbe42533ea3b5152b5ba3f5f3

          SHA512

          b2df4cde682d46b1f7d7ea0c8027dc0e8ab7f6024adedbf94f396430e6a856a0b667f8e8d4ac70649b59c564e48b3516a8f2d5ae901bc102dfcf0df1a2588c95

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391359.exe

          Filesize

          683KB

          MD5

          b3a22540fc405733acba4c71540e94f5

          SHA1

          aacb0adb9a3b5a6f6ecaa20673f0225cb25a3fac

          SHA256

          c2e3127271e3383bf30cdc0e999586664e569f51ebcda95dc1fa7c930d57c77d

          SHA512

          fcdfe5f4e715b607caca04c715c5df900b528695c75b0de68dfba8e095c7315e88ba2dbb5c7d2d219c77f8a16de65e8d4af87b073c439ad9bddf58ed8c11ea2d

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391359.exe

          Filesize

          683KB

          MD5

          b3a22540fc405733acba4c71540e94f5

          SHA1

          aacb0adb9a3b5a6f6ecaa20673f0225cb25a3fac

          SHA256

          c2e3127271e3383bf30cdc0e999586664e569f51ebcda95dc1fa7c930d57c77d

          SHA512

          fcdfe5f4e715b607caca04c715c5df900b528695c75b0de68dfba8e095c7315e88ba2dbb5c7d2d219c77f8a16de65e8d4af87b073c439ad9bddf58ed8c11ea2d

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4245940.exe

          Filesize

          292KB

          MD5

          7c6098b4c62ae39a2d1a0c72f1dc6faa

          SHA1

          ef9bfabd472a2abe5ad38e08fee6a8ca6688a81b

          SHA256

          b40f45fc9b0561f9710898d2514ef681d8afbdd07281140b75c5c112144e9b5f

          SHA512

          c6421c8b78be73b54e73c6a68e80a3319b918f9dc414c9ff9952589280e7d44fbbf28afb764e288510986ebca350d7a5d99e8c6a70a9587fcf750bf50949898a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4245940.exe

          Filesize

          292KB

          MD5

          7c6098b4c62ae39a2d1a0c72f1dc6faa

          SHA1

          ef9bfabd472a2abe5ad38e08fee6a8ca6688a81b

          SHA256

          b40f45fc9b0561f9710898d2514ef681d8afbdd07281140b75c5c112144e9b5f

          SHA512

          c6421c8b78be73b54e73c6a68e80a3319b918f9dc414c9ff9952589280e7d44fbbf28afb764e288510986ebca350d7a5d99e8c6a70a9587fcf750bf50949898a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\h8086837.exe

          Filesize

          174KB

          MD5

          7006ba3bf9001fddd656d2bdbbffb4f2

          SHA1

          88003e66c16c69e5dad50b317c980d30dc7e01d4

          SHA256

          6d990c8359c76ac4b4f52c0479460bc29477321cbe42533ea3b5152b5ba3f5f3

          SHA512

          b2df4cde682d46b1f7d7ea0c8027dc0e8ab7f6024adedbf94f396430e6a856a0b667f8e8d4ac70649b59c564e48b3516a8f2d5ae901bc102dfcf0df1a2588c95

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\h8086837.exe

          Filesize

          174KB

          MD5

          7006ba3bf9001fddd656d2bdbbffb4f2

          SHA1

          88003e66c16c69e5dad50b317c980d30dc7e01d4

          SHA256

          6d990c8359c76ac4b4f52c0479460bc29477321cbe42533ea3b5152b5ba3f5f3

          SHA512

          b2df4cde682d46b1f7d7ea0c8027dc0e8ab7f6024adedbf94f396430e6a856a0b667f8e8d4ac70649b59c564e48b3516a8f2d5ae901bc102dfcf0df1a2588c95

        • memory/2768-30-0x0000000000DD0000-0x0000000000E00000-memory.dmp

          Filesize

          192KB

        • memory/2768-31-0x00000000005C0000-0x00000000005C6000-memory.dmp

          Filesize

          24KB