Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 15:02

General

  • Target

    a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa.exe

  • Size

    1.1MB

  • MD5

    de0c80bded816740a0df7c20dce4b10a

  • SHA1

    9842e042025531f42ff5e62bdf30dcb398f79341

  • SHA256

    a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa

  • SHA512

    272a654b220349b919bf971d135e8854e83f06978215f3a56b76a44e67eda177719ff038310b91b0a7ab86c0a8d242e83569e20a04d1859b287f418ef5d6c211

  • SSDEEP

    24576:OyrVN0rt0f9iqLu4Y6f43ZsOj33Ei8pZm9NiCcbOFLz:drW0Mq6P3ZsoEirNXJ

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa.exe
    "C:\Users\Admin\AppData\Local\Temp\a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2829041.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2829041.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5402789.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5402789.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4097970.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4097970.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2829041.exe

    Filesize

    750KB

    MD5

    1b59a5c318367a187cad11a46a5fe929

    SHA1

    a2197d2d100d0be0d9429291ece540a4ab0e1249

    SHA256

    e4c22bca2960c535a907558d14a3ac53cba2cd0d857f81e587bfede8c6bd9148

    SHA512

    3f64d774a55f0c4448cd033329ddf6a6bb03fc2ba266bac9d4dc959261327f0438f83327c69f53b1d19141d294808e4954bbd27ca606a9678ac786c16e349a1a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5402789.exe

    Filesize

    304KB

    MD5

    64ca257ff3e8a8d28d2c400e07581e19

    SHA1

    31434adb50248b4c20e562c238e8e81b220b10b5

    SHA256

    e1326efc619cdc8372d0e96c0134f474c44a0916a091b6f3f4221198d7983ff6

    SHA512

    85c5e6c34fc16a788e7e1224658bf831b3a1dfe3766f4660761fa53d68f974b71546c4030d1951082e47a99347af21538fb87e89984c6217907c793e05bac69d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4097970.exe

    Filesize

    145KB

    MD5

    842c86c61f47ca09c937cbe6e3562757

    SHA1

    316fbcdf3d46f0ff06aa747f8cc38c9df80e8d2a

    SHA256

    d18e32d6b3f4b2b0b5ad89a27246338ed3889e5079c2604f36c528c7ab9132c8

    SHA512

    106c7aa3e9c032e261260b853b18d992aafdd70a55a6b90a3b7325d2d445c674398353319ae51e3a316d34864d94996d4e5a570e26c3704cb55a23a13dea69bd

  • memory/2192-21-0x00000000000D0000-0x00000000000FA000-memory.dmp

    Filesize

    168KB

  • memory/2192-22-0x0000000004F40000-0x0000000005558000-memory.dmp

    Filesize

    6.1MB

  • memory/2192-23-0x0000000004A60000-0x0000000004B6A000-memory.dmp

    Filesize

    1.0MB

  • memory/2192-24-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/2192-25-0x00000000049F0000-0x0000000004A2C000-memory.dmp

    Filesize

    240KB

  • memory/2192-26-0x0000000004B70000-0x0000000004BBC000-memory.dmp

    Filesize

    304KB