Analysis

  • max time kernel
    139s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2024 10:22

General

  • Target

    73f00d2746a71e412b9c6d43c7f5e0ed5faf3e03730bfd6e24b8955e42c2267e.exe

  • Size

    527KB

  • MD5

    9579c9ca9e85cfd4436f4acb8e11642b

  • SHA1

    43012c4c839b1888c6d9c2108cf8526966e8f348

  • SHA256

    73f00d2746a71e412b9c6d43c7f5e0ed5faf3e03730bfd6e24b8955e42c2267e

  • SHA512

    92a3e0beeded6e4c8d3040a7066eb02335ac91050fef98e1185e57ce6dd19001b8d5b0b6b8070a195c06c3fefb90c0ef780c7929fc476ee177b866ed8a5a18a5

  • SSDEEP

    12288:4+l28XEFFLFcsUOKJ7ZIPcf8oXKPFWrEi8FEO:bXXw53XuIvOKPF5RFt

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

77.105.135.107:3445

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73f00d2746a71e412b9c6d43c7f5e0ed5faf3e03730bfd6e24b8955e42c2267e.exe
    "C:\Users\Admin\AppData\Local\Temp\73f00d2746a71e412b9c6d43c7f5e0ed5faf3e03730bfd6e24b8955e42c2267e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2276
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:4068
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:1956
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4560

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/232-0-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/4560-1-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/4560-2-0x000000007428E000-0x000000007428F000-memory.dmp

          Filesize

          4KB

        • memory/4560-3-0x0000000005590000-0x0000000005B34000-memory.dmp

          Filesize

          5.6MB

        • memory/4560-4-0x0000000004FE0000-0x0000000005072000-memory.dmp

          Filesize

          584KB

        • memory/4560-5-0x0000000074280000-0x0000000074A30000-memory.dmp

          Filesize

          7.7MB

        • memory/4560-6-0x00000000051A0000-0x00000000051AA000-memory.dmp

          Filesize

          40KB

        • memory/4560-7-0x0000000006160000-0x0000000006778000-memory.dmp

          Filesize

          6.1MB

        • memory/4560-8-0x0000000005350000-0x000000000545A000-memory.dmp

          Filesize

          1.0MB

        • memory/4560-9-0x0000000005280000-0x0000000005292000-memory.dmp

          Filesize

          72KB

        • memory/4560-10-0x00000000052E0000-0x000000000531C000-memory.dmp

          Filesize

          240KB

        • memory/4560-11-0x0000000005460000-0x00000000054AC000-memory.dmp

          Filesize

          304KB

        • memory/4560-12-0x0000000005BB0000-0x0000000005C16000-memory.dmp

          Filesize

          408KB

        • memory/4560-13-0x00000000069D0000-0x0000000006A20000-memory.dmp

          Filesize

          320KB

        • memory/4560-14-0x0000000006CF0000-0x0000000006EB2000-memory.dmp

          Filesize

          1.8MB

        • memory/4560-15-0x00000000073F0000-0x000000000791C000-memory.dmp

          Filesize

          5.2MB

        • memory/4560-17-0x0000000074280000-0x0000000074A30000-memory.dmp

          Filesize

          7.7MB