Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-03-2024 12:07

General

  • Target

    0x00080000000122e2-2178.exe

  • Size

    168KB

  • MD5

    76199ce7e6a2f7da1d742a72217112f5

  • SHA1

    b04ac4a1f2f84280323a74aed1f6f2ecfcb46942

  • SHA256

    0beec7eddd3bb3a8325e09efc7a5da44336361e0f1f512d682af65cea45c34fc

  • SHA512

    72ac7a705f480adb30bbd2cb9c97af178d3c5ca1cc7df3ddfcf94f24d028068ab8ed63c66feb718c63bd5a3ccd2cddc6e0cd3b83a2f8e7977b329fd016d5e29f

  • SSDEEP

    1536:jyOHBgqlVZRGWQ3ZrrQUYH9izdOzu2dTGqVibuTjNkZOjgAVU83wYke8e8hf:jyOhyTI7YqV2KqZOjgAVUw8e8hf

Malware Config

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x00080000000122e2-2178.exe
    "C:\Users\Admin\AppData\Local\Temp\0x00080000000122e2-2178.exe"
    1⤵
      PID:4868

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4868-0-0x0000000000470000-0x000000000049E000-memory.dmp
      Filesize

      184KB

    • memory/4868-1-0x0000000074DE0000-0x0000000075590000-memory.dmp
      Filesize

      7.7MB

    • memory/4868-2-0x0000000004D30000-0x0000000004D36000-memory.dmp
      Filesize

      24KB

    • memory/4868-3-0x000000000A850000-0x000000000AE68000-memory.dmp
      Filesize

      6.1MB

    • memory/4868-4-0x000000000A3C0000-0x000000000A4CA000-memory.dmp
      Filesize

      1.0MB

    • memory/4868-6-0x0000000004D60000-0x0000000004D70000-memory.dmp
      Filesize

      64KB

    • memory/4868-5-0x000000000A2F0000-0x000000000A302000-memory.dmp
      Filesize

      72KB

    • memory/4868-7-0x000000000A350000-0x000000000A38C000-memory.dmp
      Filesize

      240KB

    • memory/4868-8-0x0000000004870000-0x00000000048BC000-memory.dmp
      Filesize

      304KB

    • memory/4868-9-0x0000000074DE0000-0x0000000075590000-memory.dmp
      Filesize

      7.7MB

    • memory/4868-10-0x0000000004D60000-0x0000000004D70000-memory.dmp
      Filesize

      64KB