Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:40

General

  • Target

    dc87cba915fb6101c577a0531cedb5d304be24abd22d9faa34b7a606ccc5f8e1.exe

  • Size

    643KB

  • MD5

    ff1d1ab6fe52c810fe4abf9552b69e9a

  • SHA1

    3472a8f8d5d1d93765c85d242ebf1c043966739a

  • SHA256

    dc87cba915fb6101c577a0531cedb5d304be24abd22d9faa34b7a606ccc5f8e1

  • SHA512

    4d8cf50d9c5dfc6a669a8914b2a6ada01c90f21a7bb113cfcd256bf796267de14d139d060876ebf1dd87cf8bf81378389f5b2ac74e11143b28881978a804629d

  • SSDEEP

    12288:sMrpy90UGsoYRiX8Oo/GehZL0Kk5xAkak1HSmapBPBWztYhCvQ5w+1:9y3FW8ntUJ5xAkFp5ajBWza35

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc87cba915fb6101c577a0531cedb5d304be24abd22d9faa34b7a606ccc5f8e1.exe
    "C:\Users\Admin\AppData\Local\Temp\dc87cba915fb6101c577a0531cedb5d304be24abd22d9faa34b7a606ccc5f8e1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zh6gi1CV.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zh6gi1CV.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Jc2PF6ps.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Jc2PF6ps.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2mG650Im.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2mG650Im.exe
          4⤵
          • Executes dropped EXE
          PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zh6gi1CV.exe

    Filesize

    502KB

    MD5

    e6aa103178bd89749e3cb4586834ee72

    SHA1

    8c451756033696cb7494557527e05ef3b1df400a

    SHA256

    e43d20a8bbc897e3deb53655355d0290d1482fb1d0fe3be20624459c25d78be6

    SHA512

    112452a497775642dae895e65d417141c1202ad0e76502367349e0e516b05c4495a0211b9f52e68e8953c5c7825ee034fc6ea458ac2a8215d06e872fcfbeb409

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Jc2PF6ps.exe

    Filesize

    320KB

    MD5

    e358c4f670e9e02c2a86f2c201d56130

    SHA1

    dbf34db2dda6d990ea4cbb829b9e3c0bda174862

    SHA256

    904f554ea44e53a1dc35f3fcc8dcd6610e360b959e5d60b21ef1d508cf5db174

    SHA512

    23d3aa0d551b360c222832acfb52b845116841daf0dd3e494fa2b80f49ea6bf9acd533b202348d578a6c1e68481463d024d0ce180eb65fa33200a6b69099726b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2mG650Im.exe

    Filesize

    222KB

    MD5

    11884cd71f09b35d46a6e3aeb74069d0

    SHA1

    78630ecec645571e955c8289100ecbe769454c14

    SHA256

    8bc4f9fef1af4940b931f71ebca1dcfb9b2439fc3e83fdae8e89008c20e2bbc3

    SHA512

    b82ec5e29a244c8ea6dd2e04d8030c1a8029690687c0f8a523f5c2ca25108a8c4b9c8b9831b54875ed953e85a02ff7d64b8a6e716cfa508c6c3ad9f4495d3b7a

  • memory/2824-21-0x00000000000B0000-0x00000000000EE000-memory.dmp

    Filesize

    248KB

  • memory/2824-22-0x0000000007340000-0x00000000078E4000-memory.dmp

    Filesize

    5.6MB

  • memory/2824-23-0x0000000006E70000-0x0000000006F02000-memory.dmp

    Filesize

    584KB

  • memory/2824-24-0x00000000022E0000-0x00000000022EA000-memory.dmp

    Filesize

    40KB

  • memory/2824-25-0x0000000007F10000-0x0000000008528000-memory.dmp

    Filesize

    6.1MB

  • memory/2824-26-0x00000000078F0000-0x00000000079FA000-memory.dmp

    Filesize

    1.0MB

  • memory/2824-27-0x0000000006FA0000-0x0000000006FB2000-memory.dmp

    Filesize

    72KB

  • memory/2824-28-0x0000000007260000-0x000000000729C000-memory.dmp

    Filesize

    240KB

  • memory/2824-29-0x00000000072A0000-0x00000000072EC000-memory.dmp

    Filesize

    304KB