Analysis

  • max time kernel
    132s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 14:29 UTC

General

  • Target

    eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f.exe

  • Size

    856KB

  • MD5

    102cc57cf59a9b99f5615c58ba8ae4a2

  • SHA1

    0e92c89813cae891a354a5feea121b2aad6d77ab

  • SHA256

    eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f

  • SHA512

    7d1cab053e2b8aa3b66f866f3beff4241c85fc9d17ee6b1f7b8b1c6964b7aca133cf2ae080feb91e0b82f304d45f2556d88e072274bf17bb7cc479d3744c2409

  • SSDEEP

    12288:6MrMy90GsPfX7+uwEvNGQdJ6HpKFKeVNxsZMQDkbQFUoSCfd07Cw:+yqL+ubvUQyHkFKaxsZZugRw

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f.exe
    "C:\Users\Admin\AppData\Local\Temp\eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7635366.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7635366.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3093622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3093622.exe
        3⤵
        • Executes dropped EXE
        PID:1012

Network

  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    79.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    79.190.18.2.in-addr.arpa
    IN PTR
    Response
    79.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-79deploystaticakamaitechnologiescom
  • flag-us
    DNS
    217.135.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.135.221.88.in-addr.arpa
    IN PTR
    Response
    217.135.221.88.in-addr.arpa
    IN PTR
    a88-221-135-217deploystaticakamaitechnologiescom
  • flag-us
    DNS
    77.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    77.190.18.2.in-addr.arpa
    IN PTR
    Response
    77.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-77deploystaticakamaitechnologiescom
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 77.91.68.48:19071
    f3093622.exe
    260 B
    5
  • 77.91.68.48:19071
    f3093622.exe
    260 B
    5
  • 77.91.68.48:19071
    f3093622.exe
    260 B
    5
  • 77.91.68.48:19071
    f3093622.exe
    260 B
    5
  • 77.91.68.48:19071
    f3093622.exe
    260 B
    5
  • 77.91.68.48:19071
    f3093622.exe
    260 B
    5
  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    79.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    79.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    217.135.221.88.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    217.135.221.88.in-addr.arpa

  • 8.8.8.8:53
    77.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    77.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7635366.exe

    Filesize

    755KB

    MD5

    20715fe4786611010dd91e5fb0fee438

    SHA1

    8e0f979a58df8603089d7c3d34ffc66f31aff7e1

    SHA256

    39390e8abc1907a2db11cd48d0435f7ad40bf8a88ea849f4a7bb914320c9538b

    SHA512

    5792f697cf925ef1bb614277dbc7c2e4bf77de8a783f311e786d79e445c9066ea0a6a1b2639e7a5c0cbf644353697322b4a2dc4414dcad95bb1ea53fe18cb04c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3093622.exe

    Filesize

    692KB

    MD5

    2245540fefa6d92f4abf404ca89b4bea

    SHA1

    af501e7d76d8af527d807f637e9c0bbc6830194e

    SHA256

    40baf491e87bf3ef59a9701dd8d7fb20f6dc803aa25915ca27ed36376650a1b3

    SHA512

    7e48156ff67155aa8d2a3548978556bab7dc9ea93c8a1a973e150604018599f3e1a203154deea360fe06eeffb97d03245dd9a524b0b5af0b2611e6c526731469

  • memory/1012-14-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1012-15-0x0000000000440000-0x0000000000470000-memory.dmp

    Filesize

    192KB

  • memory/1012-19-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1012-20-0x0000000004A60000-0x0000000004A66000-memory.dmp

    Filesize

    24KB

  • memory/1012-21-0x000000000A5C0000-0x000000000ABD8000-memory.dmp

    Filesize

    6.1MB

  • memory/1012-22-0x000000000A020000-0x000000000A12A000-memory.dmp

    Filesize

    1.0MB

  • memory/1012-23-0x000000000A160000-0x000000000A172000-memory.dmp

    Filesize

    72KB

  • memory/1012-24-0x000000000A180000-0x000000000A1BC000-memory.dmp

    Filesize

    240KB

  • memory/1012-25-0x0000000004440000-0x000000000448C000-memory.dmp

    Filesize

    304KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.