Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/12/2023, 16:23

General

  • Target

    7bc6903502a04b379047bb649a5d364c.exe

  • Size

    380KB

  • MD5

    7bc6903502a04b379047bb649a5d364c

  • SHA1

    4ee8c4a0411b938fc7a2f641905bfa3b276830d5

  • SHA256

    65befbbadf131fadbdc58f2760b7135a280632d7efd214433e5b9881cd4e54d0

  • SHA512

    448973da37f963f2eb7355d324d546f42f23c67886c715406f125ae5f7ed8ce08a8be8026427519685c1ef3a6c5c77e11feb9334a13115f52ddf73f352339299

  • SSDEEP

    6144:5mFqTIk4P+aqUidMUOB/Vq4/7HlM8Xfz22BQO6w:m1PjqUidMUeNq4jxfzw

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.81.68.115:2920

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bc6903502a04b379047bb649a5d364c.exe
    "C:\Users\Admin\AppData\Local\Temp\7bc6903502a04b379047bb649a5d364c.exe"
    1⤵
      PID:4336
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 1132
        2⤵
        • Program crash
        PID:2480
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4336 -ip 4336
      1⤵
        PID:4468

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4336-1-0x0000000002670000-0x0000000002770000-memory.dmp

        Filesize

        1024KB

      • memory/4336-2-0x00000000042E0000-0x000000000431D000-memory.dmp

        Filesize

        244KB

      • memory/4336-3-0x0000000004530000-0x000000000455C000-memory.dmp

        Filesize

        176KB

      • memory/4336-4-0x0000000000400000-0x000000000258A000-memory.dmp

        Filesize

        33.5MB

      • memory/4336-6-0x0000000004750000-0x0000000004778000-memory.dmp

        Filesize

        160KB

      • memory/4336-7-0x0000000004500000-0x0000000004510000-memory.dmp

        Filesize

        64KB

      • memory/4336-9-0x0000000004500000-0x0000000004510000-memory.dmp

        Filesize

        64KB

      • memory/4336-8-0x0000000004500000-0x0000000004510000-memory.dmp

        Filesize

        64KB

      • memory/4336-5-0x0000000006D80000-0x0000000007324000-memory.dmp

        Filesize

        5.6MB

      • memory/4336-10-0x0000000004780000-0x0000000004812000-memory.dmp

        Filesize

        584KB

      • memory/4336-11-0x00000000750F0000-0x00000000758A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4336-13-0x0000000000400000-0x000000000258A000-memory.dmp

        Filesize

        33.5MB

      • memory/4336-15-0x00000000750F0000-0x00000000758A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4336-14-0x00000000042E0000-0x000000000431D000-memory.dmp

        Filesize

        244KB