Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 01:34

General

  • Target

    9df439ac0f891b4ecc61aac64a0d37babce875a397f11e80cc29ad5063e3e520.exe

  • Size

    168KB

  • MD5

    42a1f9b3a5a2c4c73e828d55fdaeaebd

  • SHA1

    f277cd9b4ce1c3b4d0d531ee35bfbc364f7d751c

  • SHA256

    9df439ac0f891b4ecc61aac64a0d37babce875a397f11e80cc29ad5063e3e520

  • SHA512

    a7c9e8d175567e3d4dce71d10a1829d03826aa760ab237ed49ef8d79b7972225f5b9d84a563613294d37d97831bee0cf3355b4246275e7d181066b30ae624fc8

  • SSDEEP

    1536:8HHDXepqlVZRGWnKarISqKkH1jgl3mfTGqVibutZFryIaQ383wYkz8e8hg:yOMcSqKEoWyqV2MFeIaQ3t8e8hg

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Detects executables packed with ConfuserEx Mod 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9df439ac0f891b4ecc61aac64a0d37babce875a397f11e80cc29ad5063e3e520.exe
    "C:\Users\Admin\AppData\Local\Temp\9df439ac0f891b4ecc61aac64a0d37babce875a397f11e80cc29ad5063e3e520.exe"
    1⤵
      PID:4908

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4908-0-0x00000000750AE000-0x00000000750AF000-memory.dmp

      Filesize

      4KB

    • memory/4908-1-0x0000000000600000-0x0000000000630000-memory.dmp

      Filesize

      192KB

    • memory/4908-2-0x00000000028E0000-0x00000000028E6000-memory.dmp

      Filesize

      24KB

    • memory/4908-3-0x000000000AAD0000-0x000000000B0E8000-memory.dmp

      Filesize

      6.1MB

    • memory/4908-4-0x000000000A5C0000-0x000000000A6CA000-memory.dmp

      Filesize

      1.0MB

    • memory/4908-5-0x000000000A4D0000-0x000000000A4E2000-memory.dmp

      Filesize

      72KB

    • memory/4908-6-0x00000000750A0000-0x0000000075850000-memory.dmp

      Filesize

      7.7MB

    • memory/4908-7-0x000000000A530000-0x000000000A56C000-memory.dmp

      Filesize

      240KB

    • memory/4908-8-0x0000000004A20000-0x0000000004A6C000-memory.dmp

      Filesize

      304KB

    • memory/4908-9-0x00000000750AE000-0x00000000750AF000-memory.dmp

      Filesize

      4KB

    • memory/4908-10-0x00000000750A0000-0x0000000075850000-memory.dmp

      Filesize

      7.7MB