Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 12:28

General

  • Target

    3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1.exe

  • Size

    769KB

  • MD5

    173ce39c7f3c5a40e98f2dba7b2bd47e

  • SHA1

    5565bb09baf037dfc79a68eb6a74d05dadbbac92

  • SHA256

    3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1

  • SHA512

    5fa0ba08f4dee61fa64836a6738e35a24e89fbd68accaeb93f78e2016ec33319d3d487531c60bf0327ef1da78183f5a43c5dca2ce91195cc24ff49a33d923cbe

  • SSDEEP

    12288:XMr8y906F6kccByXDZiyDAHQec61kznMvAb5bWCAS7zYXaOwa:zyRFsDUyDkXIMcB1ASHYXqa

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1.exe
    "C:\Users\Admin\AppData\Local\Temp\3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5932766.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5932766.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5938639.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5938639.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0342307.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0342307.exe
          4⤵
          • Executes dropped EXE
          PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5932766.exe

    Filesize

    614KB

    MD5

    593ede5a8738e03045fbdd8749a6e243

    SHA1

    3a1a88e094044fc01fbb0f3c021f605a0bf205e5

    SHA256

    5bd93810d14d1d53c1b01da14ad20d1678b35121b1b79a99d80d6f142b042b35

    SHA512

    885dea94e1bc48fb33e6a7d090760405d66ddbe870b26bcc6698f7e5cc9be3afa2a8230d221fa5b5e0153186db8f1d8a4f3d39e6a453d3fb483af15f9726628f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5938639.exe

    Filesize

    512KB

    MD5

    4034b1065af3735c533fb7decd29832e

    SHA1

    5143cee7c773b6aaee56881d9fa835fd74d1f8b9

    SHA256

    755bb37818f1d16c04a5eea3ee3c2b89d15241d56de769f48a1ca5944cfdca30

    SHA512

    54bafe1aa2c50c7947cc31455337f6eea06cfc272353856be15fe10923d6bff89ff141bd5d106e63817f46958d99f29f2fa1805d19d7ec0577a041e50e210fad

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0342307.exe

    Filesize

    491KB

    MD5

    e76acee1a8aec03021a19b513b2840eb

    SHA1

    0f7f101568ba939c3dde1bbee456ef558e005960

    SHA256

    11d122567336ec2641f0f38b47fb9f469d9b4ffee8a017f996a028b8989a597b

    SHA512

    dcd6da202bbcf52fadfd1d12a25eb88383e76274dbd09044e9dc40e36542b4c0791234bbb3101e1e61f48958b00dac26e7c266a65bf3bd54ddec37e2fcd8a3eb

  • memory/4776-21-0x0000000000401000-0x0000000000404000-memory.dmp

    Filesize

    12KB

  • memory/4776-22-0x0000000002030000-0x00000000020BC000-memory.dmp

    Filesize

    560KB

  • memory/4776-28-0x0000000002030000-0x00000000020BC000-memory.dmp

    Filesize

    560KB

  • memory/4776-29-0x00000000024C0000-0x00000000024C1000-memory.dmp

    Filesize

    4KB

  • memory/4776-30-0x00000000024D0000-0x00000000024D6000-memory.dmp

    Filesize

    24KB

  • memory/4776-31-0x0000000005160000-0x0000000005778000-memory.dmp

    Filesize

    6.1MB

  • memory/4776-32-0x0000000004BD0000-0x0000000004CDA000-memory.dmp

    Filesize

    1.0MB

  • memory/4776-33-0x0000000004D00000-0x0000000004D12000-memory.dmp

    Filesize

    72KB

  • memory/4776-34-0x0000000004D20000-0x0000000004D5C000-memory.dmp

    Filesize

    240KB

  • memory/4776-35-0x0000000004D90000-0x0000000004DDC000-memory.dmp

    Filesize

    304KB