Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 16:40

General

  • Target

    7787b07a1719f5524402ec7cf71fb92a7177ee85b0a424e2b97f619ba2b32e49.exe

  • Size

    662KB

  • MD5

    e26f2e8ea56b980e5f02ef404d34d67f

  • SHA1

    ed2bb5bd36fd1d41d3f5212859f8500a83655459

  • SHA256

    7787b07a1719f5524402ec7cf71fb92a7177ee85b0a424e2b97f619ba2b32e49

  • SHA512

    7eb822186d7569ace7f013cdb773c959110c22793f50f15295ae953fa97d5119fe8301966bf725cac5efa6279951d3c6714376d8068648ddc06dc98a0a0fa387

  • SSDEEP

    12288:MMrQy90VfuDBn/pbAhnEO8XO1adjxEhg0maYNCApdR7NCGB:syKuDBn/5JXYKiOVaYNCApdRIGB

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7787b07a1719f5524402ec7cf71fb92a7177ee85b0a424e2b97f619ba2b32e49.exe
    "C:\Users\Admin\AppData\Local\Temp\7787b07a1719f5524402ec7cf71fb92a7177ee85b0a424e2b97f619ba2b32e49.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7878993.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7878993.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1558758.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1558758.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m5443378.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m5443378.exe
          4⤵
          • Executes dropped EXE
          PID:3052
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n1713212.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n1713212.exe
          4⤵
          • Executes dropped EXE
          PID:3668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7878993.exe

    Filesize

    560KB

    MD5

    e814332ca2465d1d266059ea126de6d3

    SHA1

    696e0fae6397ffc47596e00a2d598d19446279f8

    SHA256

    2a72bfa310dc83f3c97c962cb9b54e481232e8631b9294c1a0d361baf8661208

    SHA512

    8abe26c9259d09338c1c2398d7c0ff5acd8f6256ae942819f8e5c9413f6a7259854b43b0167de2af5d673fb5cbd9c95281c717053883032481e295332f4dc6ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1558758.exe

    Filesize

    271KB

    MD5

    f02b8ab3927c5b11d162fc565310d175

    SHA1

    a748ae40716733900ce4e20879790565f37070f3

    SHA256

    6e1748a631938e7f963c5f5e9c469c646f9546d9d1ff7d6421fd7c721f763a4f

    SHA512

    961078fc01a352488d3af33c875617c87d9aef1587b14647568623047d35ac8f00f225789644d82efe0b5626cb92ce5feaf7bb0377cb3c98d31509f9e76b8d35

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m5443378.exe

    Filesize

    142KB

    MD5

    a160e87508ed15322145314d0aa7705a

    SHA1

    f103bac29c73997fdabce012222c96ce59a68ff3

    SHA256

    13f5bb2f00e79391a8a7071888bb561fed27100d5fa2f458a86aeef011cbf40f

    SHA512

    53b50afc3e2389296a6822394eb4a35264d8f21465e072662eb887257ee39cc6ca4fc97a353e1b15e49bdaecb8ee847ca69de0acd38dc1b891358de720eb2e9c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n1713212.exe

    Filesize

    175KB

    MD5

    32b5d6a8be5487a08590f197da2f06c3

    SHA1

    3d661fdf9f56eefbe71b8457e560dbffe74415af

    SHA256

    9605f3208b022f50d39f014936bc076c0ab71dcdb1506b5ca9a3e5ad1f671ace

    SHA512

    30fddb3b59933ebcadd04f205afc192fb13a91c67b09803d6d8be8eb1542f9ffab013d5daf302e8fc29cbc63cfb40a41b5a5a6c37caabefcc0a4d33cb40c531b

  • memory/3668-24-0x0000000000AE0000-0x0000000000B10000-memory.dmp

    Filesize

    192KB

  • memory/3668-25-0x0000000002D50000-0x0000000002D56000-memory.dmp

    Filesize

    24KB

  • memory/3668-26-0x000000000AF30000-0x000000000B548000-memory.dmp

    Filesize

    6.1MB

  • memory/3668-27-0x000000000AA90000-0x000000000AB9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3668-28-0x000000000A9D0000-0x000000000A9E2000-memory.dmp

    Filesize

    72KB

  • memory/3668-29-0x000000000AA30000-0x000000000AA6C000-memory.dmp

    Filesize

    240KB

  • memory/3668-30-0x0000000004DB0000-0x0000000004DFC000-memory.dmp

    Filesize

    304KB