Analysis

  • max time kernel
    131s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 21:33

General

  • Target

    11B0557B857DE763E2A1A67B5CF33A7D.exe

  • Size

    469KB

  • MD5

    11b0557b857de763e2a1a67b5cf33a7d

  • SHA1

    6d033484de053b5d1788568efd364ef8c92d0985

  • SHA256

    ca0eb0fc3b97aca8601de95ca56fd06f565a63f7fabc508bf7f9deac8d58ef18

  • SHA512

    035cfd23ead127bace8c7b89b9e99f7dec0a1916015f7e63e7f6d48b2b951ca78c25673b21af735bafc6f78f483f8661666a67135c54b075d0ec91f55322b37c

  • SSDEEP

    6144:Tepyy7cR+ZjD7fAOlRjx3ruLR4Cf75uL8Mzci:Tepr7KEfbpx3ru14Cf78ci

Malware Config

Extracted

Family

redline

Botnet

2131228623

C2

https://pastebin.com/raw/NgsUAPya

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11B0557B857DE763E2A1A67B5CF33A7D.exe
    "C:\Users\Admin\AppData\Local\Temp\11B0557B857DE763E2A1A67B5CF33A7D.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:556

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/556-0-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/556-1-0x00000000748B0000-0x0000000075060000-memory.dmp

          Filesize

          7.7MB

        • memory/556-2-0x00000000055F0000-0x0000000005C08000-memory.dmp

          Filesize

          6.1MB

        • memory/556-3-0x00000000028B0000-0x00000000028C2000-memory.dmp

          Filesize

          72KB

        • memory/556-4-0x0000000004FD0000-0x00000000050DA000-memory.dmp

          Filesize

          1.0MB

        • memory/556-5-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

          Filesize

          64KB

        • memory/556-6-0x0000000005FD0000-0x000000000600C000-memory.dmp

          Filesize

          240KB

        • memory/556-7-0x0000000006010000-0x000000000605C000-memory.dmp

          Filesize

          304KB

        • memory/556-8-0x00000000062F0000-0x00000000064B2000-memory.dmp

          Filesize

          1.8MB

        • memory/556-9-0x00000000069F0000-0x0000000006F1C000-memory.dmp

          Filesize

          5.2MB

        • memory/556-10-0x0000000006260000-0x00000000062C6000-memory.dmp

          Filesize

          408KB

        • memory/556-11-0x00000000066B0000-0x0000000006742000-memory.dmp

          Filesize

          584KB

        • memory/556-12-0x00000000074D0000-0x0000000007A74000-memory.dmp

          Filesize

          5.6MB

        • memory/556-14-0x0000000006890000-0x0000000006906000-memory.dmp

          Filesize

          472KB

        • memory/556-13-0x0000000006750000-0x00000000067A0000-memory.dmp

          Filesize

          320KB

        • memory/556-15-0x0000000006910000-0x000000000692E000-memory.dmp

          Filesize

          120KB

        • memory/556-17-0x00000000748B0000-0x0000000075060000-memory.dmp

          Filesize

          7.7MB