Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 06:19

General

  • Target

    127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba.exe

  • Size

    307KB

  • MD5

    7ca7c1a1e3520b42ee24d3b82c215022

  • SHA1

    1b2394ce0934a55e09f29874d70a41f80943608b

  • SHA256

    127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba

  • SHA512

    0e115f5b0af7d7dbced850c883ef63fcac7bf4cef8d7897c9dce247ff0220e2c3273a0ce57ee426487276fdc85ac6198f83d7123576320ca4083ab5ad85c5feb

  • SSDEEP

    6144:K+y+bnr+Hp0yN90QEqUHh4HZn7Erx2br2JpeFfX0vCk0uqo:SMrny90TH0gsbrOAfk6kFL

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba.exe
    "C:\Users\Admin\AppData\Local\Temp\127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k9045512.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k9045512.exe
      2⤵
      • Executes dropped EXE
      PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k9045512.exe
    Filesize

    169KB

    MD5

    df2e676c830f164d9f214c8959e674a5

    SHA1

    590743303ba64d989b5e8dc0a4779b87c2a05be7

    SHA256

    d2c29095234fb20d37c2763193d3b21ca708f11ec501db6c6c52b797752e9dc1

    SHA512

    e743b3683816475376d1e985120d96ba3b82497389cc2eef156583de8f83fdd31d0fa9712ca69a2e2ec35fa32fb240f78206d311fcfaf55000976b318155bfd0

  • memory/2368-7-0x00000000744DE000-0x00000000744DF000-memory.dmp
    Filesize

    4KB

  • memory/2368-8-0x0000000000DF0000-0x0000000000E20000-memory.dmp
    Filesize

    192KB

  • memory/2368-9-0x0000000005850000-0x0000000005856000-memory.dmp
    Filesize

    24KB

  • memory/2368-10-0x0000000005EB0000-0x00000000064C8000-memory.dmp
    Filesize

    6.1MB

  • memory/2368-11-0x00000000059A0000-0x0000000005AAA000-memory.dmp
    Filesize

    1.0MB

  • memory/2368-12-0x00000000058B0000-0x00000000058C2000-memory.dmp
    Filesize

    72KB

  • memory/2368-14-0x00000000744D0000-0x0000000074C80000-memory.dmp
    Filesize

    7.7MB

  • memory/2368-13-0x0000000005910000-0x000000000594C000-memory.dmp
    Filesize

    240KB

  • memory/2368-15-0x0000000005AB0000-0x0000000005AFC000-memory.dmp
    Filesize

    304KB

  • memory/2368-16-0x00000000744DE000-0x00000000744DF000-memory.dmp
    Filesize

    4KB

  • memory/2368-17-0x00000000744D0000-0x0000000074C80000-memory.dmp
    Filesize

    7.7MB