Analysis

  • max time kernel
    287s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/05/2024, 06:06

General

  • Target

    b476179f38e223e7ab7f153fd8a0dd1bc382aa4265242b3b632e0f10c5ab0125.exe

  • Size

    291KB

  • MD5

    926df3701c6b893b25b319ce19e75291

  • SHA1

    b423559901c4b9ab643b385e2e09cd1915a39c58

  • SHA256

    b476179f38e223e7ab7f153fd8a0dd1bc382aa4265242b3b632e0f10c5ab0125

  • SHA512

    8213aa94a9bfb06e20719189b3bba55ceda642706db94affc9150d6f1cbbda774eb7ab3d479c0b63682ea63f994d7cad557e25f14f8305badebda2443ad72244

  • SSDEEP

    3072:KdY+6LDDhKVa6eQVy6PXcqIRZDVuScrOmNgut071nobhRmaxWrTse8K8hBVceJ2U:iYhhKVa6eePtIRJgSeOmNZpWrTsEhK1

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

194.169.175.235:42691

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b476179f38e223e7ab7f153fd8a0dd1bc382aa4265242b3b632e0f10c5ab0125.exe
    "C:\Users\Admin\AppData\Local\Temp\b476179f38e223e7ab7f153fd8a0dd1bc382aa4265242b3b632e0f10c5ab0125.exe"
    1⤵
      PID:3652

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3652-1-0x00000000001C0000-0x00000000001FE000-memory.dmp

            Filesize

            248KB

          • memory/3652-4-0x0000000000401000-0x0000000000403000-memory.dmp

            Filesize

            8KB

          • memory/3652-5-0x0000000000400000-0x000000000044A000-memory.dmp

            Filesize

            296KB

          • memory/3652-6-0x0000000006E40000-0x000000000733E000-memory.dmp

            Filesize

            5.0MB

          • memory/3652-7-0x0000000007350000-0x00000000073E2000-memory.dmp

            Filesize

            584KB

          • memory/3652-8-0x0000000004530000-0x000000000453A000-memory.dmp

            Filesize

            40KB

          • memory/3652-9-0x0000000007920000-0x0000000007F26000-memory.dmp

            Filesize

            6.0MB

          • memory/3652-10-0x0000000007560000-0x000000000766A000-memory.dmp

            Filesize

            1.0MB

          • memory/3652-11-0x0000000007690000-0x00000000076A2000-memory.dmp

            Filesize

            72KB

          • memory/3652-12-0x00000000076C0000-0x00000000076FE000-memory.dmp

            Filesize

            248KB

          • memory/3652-13-0x0000000007730000-0x000000000777B000-memory.dmp

            Filesize

            300KB