Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 10:00

General

  • Target

    d353176614b7dd329d9f436d6a34f007c32540fac4c5f4e3f2884d89ed599fe5.exe

  • Size

    488KB

  • MD5

    e6a588dedbf9392a89dd519d40515437

  • SHA1

    4a3083750936eb7e16b7efad425452d6c1c6278f

  • SHA256

    d353176614b7dd329d9f436d6a34f007c32540fac4c5f4e3f2884d89ed599fe5

  • SHA512

    2bb4912a75594d1daaa20812b390494e03a9cfd5119ea5c7b0809063111b8e5bc0afc9309b96b8586bc6c6ad1e54f3c6e0621bf6c40f094507a372c40a411b44

  • SSDEEP

    12288:hMr2y90o/lhAQkVLWuMJUO9vCsde3OE3o2Vim:7yBKQsyudO9vbP27

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d353176614b7dd329d9f436d6a34f007c32540fac4c5f4e3f2884d89ed599fe5.exe
    "C:\Users\Admin\AppData\Local\Temp\d353176614b7dd329d9f436d6a34f007c32540fac4c5f4e3f2884d89ed599fe5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6933528.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6933528.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5235728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5235728.exe
        3⤵
        • Executes dropped EXE
        PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6933528.exe

    Filesize

    316KB

    MD5

    ef6416e3172e673b5ada872fbed25045

    SHA1

    699e786014ee414bc2ba9eb3c8018c3374765a61

    SHA256

    fc29a80a1c0ea6d57ecb3f789dcbe2b8e849edb11597f13dbeea0b0dedb5237d

    SHA512

    c283fd9662e708d16561fc81193104d8cc90635661d9126c66269ae9f17c964aaa872c01082a70f35416fdf565a8a8b404bc0e037240918c5a8f6fbcd952db9b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5235728.exe

    Filesize

    168KB

    MD5

    5b7bda074785473bf934cd06139acac1

    SHA1

    0310d72e89624616b5f2b93a660880f4d25abc27

    SHA256

    2bb3637bf6b44a2988a5b1d7005e7a67fa646e485cc26afdf5e3e25415d6b3fb

    SHA512

    f1cc0ae7f47c854525235559ca114a7e02e6ed38f69de99934ea48ce3e8c50acc1fa0a214e8e2673926c1e932b0e5485ece5381f69f2d54da48e229b0848250f

  • memory/2188-14-0x0000000073CAE000-0x0000000073CAF000-memory.dmp

    Filesize

    4KB

  • memory/2188-15-0x00000000002A0000-0x00000000002CE000-memory.dmp

    Filesize

    184KB

  • memory/2188-16-0x0000000002440000-0x0000000002446000-memory.dmp

    Filesize

    24KB

  • memory/2188-17-0x0000000005220000-0x0000000005838000-memory.dmp

    Filesize

    6.1MB

  • memory/2188-18-0x0000000004D10000-0x0000000004E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/2188-19-0x0000000004C20000-0x0000000004C32000-memory.dmp

    Filesize

    72KB

  • memory/2188-20-0x0000000004C80000-0x0000000004CBC000-memory.dmp

    Filesize

    240KB

  • memory/2188-21-0x0000000073CA0000-0x0000000074450000-memory.dmp

    Filesize

    7.7MB

  • memory/2188-22-0x0000000004E20000-0x0000000004E6C000-memory.dmp

    Filesize

    304KB

  • memory/2188-23-0x0000000073CAE000-0x0000000073CAF000-memory.dmp

    Filesize

    4KB

  • memory/2188-24-0x0000000073CA0000-0x0000000074450000-memory.dmp

    Filesize

    7.7MB