Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 10:18

General

  • Target

    1e5cfff6f14c0bd993b2067265734473bba336502c0c057bbed0429ae659f27c.exe

  • Size

    585KB

  • MD5

    efa015ab2b5f2c15edea59878603ce2a

  • SHA1

    34e1601cea9dc60e38edbe834ae39dda5b482acd

  • SHA256

    1e5cfff6f14c0bd993b2067265734473bba336502c0c057bbed0429ae659f27c

  • SHA512

    98fd423229b47ac6081c872b9778837ea7efe80de24771025a3573396faab50375bac5f8b6345ead1dc9cb79183a18070b8481bf913b8f848e5f5c96838b5ee8

  • SSDEEP

    12288:wMrGy90UE97sKgv1veVpIymuse+6GNJSGH9LRa:myJ9KAJeIxuo6GNJX9LRa

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e5cfff6f14c0bd993b2067265734473bba336502c0c057bbed0429ae659f27c.exe
    "C:\Users\Admin\AppData\Local\Temp\1e5cfff6f14c0bd993b2067265734473bba336502c0c057bbed0429ae659f27c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6843873.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6843873.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2956229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2956229.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3228989.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3228989.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6843873.exe

    Filesize

    377KB

    MD5

    0e18ede4efd9b788502e386a54dd9ccb

    SHA1

    8e232573419b469d8754ea1ddad937b737e254cf

    SHA256

    c25efc56a02c69aaa4bd00aaab5ee6e5d5c2733e57075f2169503ca7ab68bb1c

    SHA512

    c596a4096dd8a757abfd2ceaf507c1531bbfb664f3d66a86c831322b20e00c893f42645be604dfaf8571d7d389f78b1a966c777770eee9cb40f2c8fe6f06eacc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2956229.exe

    Filesize

    206KB

    MD5

    357bc4eaeb07d61a81670349ab2af942

    SHA1

    3e12cfff6ffc430f364eeae6d7992f3effc2c5b6

    SHA256

    52fd1c3dec5b2e53f83be85b6e8760ae8c1f0147d7cad73b28fa8555768b284a

    SHA512

    1a268ad378117a13e8c57893bf7cf358c7aff5faa48e0fdee1116e63359b80e8fb300bf28b3ebb13b2a8d913e172f03a79e9bd0a219f7f67ae2464baf1c2b62c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3228989.exe

    Filesize

    172KB

    MD5

    72f2c9672239b6dc08cc10067a688be8

    SHA1

    a4bce1c4bd859443128cf0afe5d2754fbe6010b0

    SHA256

    eed4495bf73ae005dd46bff96db52ffa2084a13ff1cde5c93999fe3198cd4055

    SHA512

    e94942412a66ca2371b411f8d3145192d32192e0d0a73dcb03484f04ed33f6dccb0db99582d5268c5e8a358cd4d67d9ae526d42980b176f844dd89bae97582d2

  • memory/1884-21-0x0000000000EA0000-0x0000000000ED0000-memory.dmp

    Filesize

    192KB

  • memory/1884-22-0x00000000018E0000-0x00000000018E6000-memory.dmp

    Filesize

    24KB

  • memory/1884-23-0x000000000B370000-0x000000000B988000-memory.dmp

    Filesize

    6.1MB

  • memory/1884-24-0x000000000AE60000-0x000000000AF6A000-memory.dmp

    Filesize

    1.0MB

  • memory/1884-25-0x000000000AD90000-0x000000000ADA2000-memory.dmp

    Filesize

    72KB

  • memory/1884-26-0x000000000ADF0000-0x000000000AE2C000-memory.dmp

    Filesize

    240KB

  • memory/1884-27-0x0000000005210000-0x000000000525C000-memory.dmp

    Filesize

    304KB