Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 15:47

General

  • Target

    0c084c47b2043d2a61c58bd88715df9b2661c7ea4551323a93d636adfc6f2a29.exe

  • Size

    1.1MB

  • MD5

    9033e378b36a0c051b47671c46ff7df7

  • SHA1

    18aacaaae29aa22a0d68eefd02f15e45ae513349

  • SHA256

    0c084c47b2043d2a61c58bd88715df9b2661c7ea4551323a93d636adfc6f2a29

  • SHA512

    c35cdf463a51970c28c8f477e87994028f874e48eba7b20bc33ccfc7dcfe02f0057258a5fc87e66cba269b41f37d4f4ece0c19ddca42eece0b622faa931e069c

  • SSDEEP

    24576:Xy2viM1hIrxRj1byKHSagGJXgnQyFr9QOuma+l:i7EhIF7yKyag+byzk

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c084c47b2043d2a61c58bd88715df9b2661c7ea4551323a93d636adfc6f2a29.exe
    "C:\Users\Admin\AppData\Local\Temp\0c084c47b2043d2a61c58bd88715df9b2661c7ea4551323a93d636adfc6f2a29.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5957100.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5957100.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5651157.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5651157.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9899749.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9899749.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5957100.exe

    Filesize

    751KB

    MD5

    04b47f5524a2db736f4aa46b4ccc1fff

    SHA1

    5d8de01222136ea4769a239bf33e6fc87afaeec0

    SHA256

    fd88ff9b2f93334377227dadc7679aeff0a06067aaa5117c6c1e708c62e3cd92

    SHA512

    bb8fc47bf91b76bd26823a41ebaa847ec10c9663340081f5a916a0dbc8aa5a219feacce07cc1887d3c2fcd696ee0951262f9145775ce9d338b14bb03395ae97b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5651157.exe

    Filesize

    305KB

    MD5

    648312d6dc15c94f64ddcf85fa60b9d5

    SHA1

    a8c254c09faa6c4208b065e2130b57c9ff957283

    SHA256

    80e432cee36fde12d43b75b96c330bd861c31d858bb2c88879744712428210da

    SHA512

    0ea900e2c34f54166c8d1a2bdc0f7c5136c4bebade585537917929809c431057c6c3af8f6094c204d24dd2551023d2a44609fc7bf2a6e5d042302fde1e1aca37

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9899749.exe

    Filesize

    145KB

    MD5

    b3917e7f36880897992d99e3f1777e5e

    SHA1

    6a02084d2be7d79a37587012edc55ba12dac5380

    SHA256

    6ee4d797fc73012fd33a2d35e499dd998fa65931a4ecdc37664f292c9eafac10

    SHA512

    eab4f62c84d5d6065c474083dd1665cad1b8aed451172f15f766bee51357047c3874ad8a65d81a44c577f69dc8ca1ac252f80d5c2f53da54a11475c7d8f5f740

  • memory/1536-21-0x0000000000380000-0x00000000003AA000-memory.dmp

    Filesize

    168KB

  • memory/1536-22-0x00000000051A0000-0x00000000057B8000-memory.dmp

    Filesize

    6.1MB

  • memory/1536-23-0x0000000004D10000-0x0000000004E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/1536-24-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1536-25-0x0000000004CA0000-0x0000000004CDC000-memory.dmp

    Filesize

    240KB

  • memory/1536-26-0x0000000004E20000-0x0000000004E6C000-memory.dmp

    Filesize

    304KB