Analysis

  • max time kernel
    131s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 11:03

General

  • Target

    b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe

  • Size

    1.1MB

  • MD5

    2f52337c3546433b9a391e704b652f49

  • SHA1

    e4c818132b5e30c79406e1f38c8fe267f6267aef

  • SHA256

    b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc

  • SHA512

    9a6ae4897686bfc0988b3856e7904943a6653264a2df4fd4afe910250eaa115c6464c762ef635f3d189bfdb1ae78789965e8a652620f2dfd23d8da37d14bd183

  • SSDEEP

    24576:JyLq9Yqv0TazkmqNqLXq9yRn1xtlUf6BRH7b+cfXX:8LWR0eAmq0+9yF1xtlUCBRH7b+cfX

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe
    "C:\Users\Admin\AppData\Local\Temp\b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6592147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6592147.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3543965.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3543965.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6927770.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6927770.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6592147.exe

    Filesize

    748KB

    MD5

    ec386e1c9bd116ab463851a52659df15

    SHA1

    5de4e676c817abcb092de5063c8aadeaa97b3962

    SHA256

    3dbe22b7959a6a5967eeca1183721de0f241aa745f5016a26db9681468af2513

    SHA512

    b29a4726485efe9a870e8ed9e13b65d8164bc89ec3e106afff29a66274ffd186d70ec284c6d7e4430db820149e8bb28ec9cc70bfec3032dab048961e37ab915e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3543965.exe

    Filesize

    304KB

    MD5

    dfd4a3e79a72ecac9aeee2ad8fc84945

    SHA1

    8256643674086d5acf283d02dd5152f679f24e90

    SHA256

    8b0d2a8ffe85242da77da5157a6083d6b3097fb827ab73c53b9fc45326332b62

    SHA512

    331cfc7497cc20ea930839c901833d66ca5d522751741ece6b1534cdd2ee630947be2c39d6c4ba3ad5e6bab37d4693c6e377267aea72b71782f5be78ea02f811

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6927770.exe

    Filesize

    145KB

    MD5

    608eaaa1cded18083e0bd614ac74e21c

    SHA1

    8f7ef2f1fb73b378ccc2d1d26207939bcb1d44cd

    SHA256

    90664b136eb98f7efb9cfc441ade6843d67feea66a890b5961cf922102372994

    SHA512

    31e0b53b901ba687dc8b9cfe468b705a24e36eeed1d17cf96e90931eef0e01db5f8d386c6c536e1b9c8d5e5e2feba982e64a75b013e346a73c391f709f99cce0

  • memory/2968-21-0x0000000000010000-0x000000000003A000-memory.dmp

    Filesize

    168KB

  • memory/2968-22-0x0000000004E20000-0x0000000005438000-memory.dmp

    Filesize

    6.1MB

  • memory/2968-23-0x00000000049A0000-0x0000000004AAA000-memory.dmp

    Filesize

    1.0MB

  • memory/2968-24-0x00000000048D0000-0x00000000048E2000-memory.dmp

    Filesize

    72KB

  • memory/2968-25-0x0000000004930000-0x000000000496C000-memory.dmp

    Filesize

    240KB

  • memory/2968-26-0x0000000004AB0000-0x0000000004AFC000-memory.dmp

    Filesize

    304KB