Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 11:47

General

  • Target

    ebfcc654cdacff2dc1478f389cd7a39a61745e5ac937eab5fbd8fe64700f3196.exe

  • Size

    307KB

  • MD5

    2aef580c2e5dd554165fd0943e77fdf5

  • SHA1

    09fbcc71dfcd5862d67c89a1330c1078ec0924e9

  • SHA256

    ebfcc654cdacff2dc1478f389cd7a39a61745e5ac937eab5fbd8fe64700f3196

  • SHA512

    cadf5a120c7eacec5275fc65397d6a3049cef92cc351f96a973a72e63ae2269eac2579b2067ddf9d6d0eb02adc0ea69914dc62711964a8d69e5076d8f8db566e

  • SSDEEP

    6144:Kjy+bnr+yp0yN90QEhop7pqcJz1ebq2SgfinjYeDah:BMrGy90Xop7pl4G2SgwYe+

Malware Config

Extracted

Family

redline

Botnet

dimas

C2

185.161.248.75:4132

Attributes
  • auth_value

    a5db9b1c53c704e612bccc93ccdb5539

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebfcc654cdacff2dc1478f389cd7a39a61745e5ac937eab5fbd8fe64700f3196.exe
    "C:\Users\Admin\AppData\Local\Temp\ebfcc654cdacff2dc1478f389cd7a39a61745e5ac937eab5fbd8fe64700f3196.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f8153266.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f8153266.exe
      2⤵
      • Executes dropped EXE
      PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f8153266.exe

    Filesize

    145KB

    MD5

    1ac23bf5c5a800fa19168487efa2feae

    SHA1

    de020cfd4e0f7b7355f5e31aff575e709b50358b

    SHA256

    ff44b4c1e6693d759df588d80bbe7191bdbece085045c40192deb304be89c28e

    SHA512

    fa394bc1599f64508c6359edd76f4c3931dcb2fda3b0b5704150fe019c39267236bb6311c8a5c9f60d5747641ed916129cbd6c02572f4cda54ed15d031f0194c

  • memory/4896-7-0x0000000074BBE000-0x0000000074BBF000-memory.dmp

    Filesize

    4KB

  • memory/4896-8-0x0000000000DB0000-0x0000000000DDA000-memory.dmp

    Filesize

    168KB

  • memory/4896-9-0x0000000005D20000-0x0000000006338000-memory.dmp

    Filesize

    6.1MB

  • memory/4896-10-0x0000000005880000-0x000000000598A000-memory.dmp

    Filesize

    1.0MB

  • memory/4896-11-0x00000000057B0000-0x00000000057C2000-memory.dmp

    Filesize

    72KB

  • memory/4896-12-0x0000000005810000-0x000000000584C000-memory.dmp

    Filesize

    240KB

  • memory/4896-13-0x0000000005990000-0x00000000059DC000-memory.dmp

    Filesize

    304KB

  • memory/4896-14-0x0000000074BBE000-0x0000000074BBF000-memory.dmp

    Filesize

    4KB