Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 15:42

General

  • Target

    127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba.exe

  • Size

    307KB

  • MD5

    7ca7c1a1e3520b42ee24d3b82c215022

  • SHA1

    1b2394ce0934a55e09f29874d70a41f80943608b

  • SHA256

    127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba

  • SHA512

    0e115f5b0af7d7dbced850c883ef63fcac7bf4cef8d7897c9dce247ff0220e2c3273a0ce57ee426487276fdc85ac6198f83d7123576320ca4083ab5ad85c5feb

  • SSDEEP

    6144:K+y+bnr+Hp0yN90QEqUHh4HZn7Erx2br2JpeFfX0vCk0uqo:SMrny90TH0gsbrOAfk6kFL

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba.exe
    "C:\Users\Admin\AppData\Local\Temp\127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k9045512.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k9045512.exe
      2⤵
      • Executes dropped EXE
      PID:4580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k9045512.exe

    Filesize

    169KB

    MD5

    df2e676c830f164d9f214c8959e674a5

    SHA1

    590743303ba64d989b5e8dc0a4779b87c2a05be7

    SHA256

    d2c29095234fb20d37c2763193d3b21ca708f11ec501db6c6c52b797752e9dc1

    SHA512

    e743b3683816475376d1e985120d96ba3b82497389cc2eef156583de8f83fdd31d0fa9712ca69a2e2ec35fa32fb240f78206d311fcfaf55000976b318155bfd0

  • memory/4580-7-0x0000000073DDE000-0x0000000073DDF000-memory.dmp

    Filesize

    4KB

  • memory/4580-8-0x0000000000CB0000-0x0000000000CE0000-memory.dmp

    Filesize

    192KB

  • memory/4580-9-0x0000000001370000-0x0000000001376000-memory.dmp

    Filesize

    24KB

  • memory/4580-10-0x000000000B090000-0x000000000B6A8000-memory.dmp

    Filesize

    6.1MB

  • memory/4580-11-0x000000000AB80000-0x000000000AC8A000-memory.dmp

    Filesize

    1.0MB

  • memory/4580-12-0x00000000056C0000-0x00000000056D2000-memory.dmp

    Filesize

    72KB

  • memory/4580-13-0x000000000AAB0000-0x000000000AAEC000-memory.dmp

    Filesize

    240KB

  • memory/4580-14-0x0000000073DD0000-0x0000000074580000-memory.dmp

    Filesize

    7.7MB

  • memory/4580-15-0x0000000005070000-0x00000000050BC000-memory.dmp

    Filesize

    304KB

  • memory/4580-16-0x0000000073DDE000-0x0000000073DDF000-memory.dmp

    Filesize

    4KB

  • memory/4580-17-0x0000000073DD0000-0x0000000074580000-memory.dmp

    Filesize

    7.7MB