Analysis

  • max time kernel
    131s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 17:12

General

  • Target

    100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe

  • Size

    1.2MB

  • MD5

    08a94e694b988f03b214ebd2439f8986

  • SHA1

    05085b96b8935bd54a8dfcc165036ea1cbd0807c

  • SHA256

    100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a

  • SHA512

    8f6ea7785860567b7e4eaa713121abca3c67756e1362763b2de374485f847f90750e62f13398f4df2c0f830aa688071de4e40cfcc646645590992392a37211ad

  • SSDEEP

    24576:yygW/ahz40l+M5iyCY12GB56F0PznAjkV+vWXKFrmR3:ZghM0lj1CYQGKF0PbAAVuL

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe
    "C:\Users\Admin\AppData\Local\Temp\100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe

    Filesize

    868KB

    MD5

    9efbb140157014b6ba812946f0b4576e

    SHA1

    afdc94b58bb2f096c036910407071b512d146078

    SHA256

    1acdee527b7d53cc3526d7873e7cde2f1114accc43edc5438059e7fcfaddb11e

    SHA512

    59cc99f2ec15d7f4bb3ed8e29329ae2003e0eaecd7243f8dd222734a1752601fce2eccf2bcb55c66c5336739310a8f0f923a9f75f0c7d1ed582de533ccd88242

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe

    Filesize

    424KB

    MD5

    cfa1716124b4ba56c341e1401d312219

    SHA1

    5008bd508a83dbca99e2fe902ac891fdee9be987

    SHA256

    a482c259d5f377d48865804c04bbe0eba1cd173147ccc6da0bcb0c370f96e218

    SHA512

    73a4160b8a185de7cb5c67e53fa325b9ed295a8935c9b4c03175e593d2e2df3c73552aa27fe8f274d84d3492c078481abac007ed3c0aaf82f333c3731ce2df5c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe

    Filesize

    145KB

    MD5

    36279fcfbcd097e0765df001da8bd45c

    SHA1

    bddca867c2a949d44f1d5d3aae34d0d23adf027a

    SHA256

    88ae2f97bcf03f797c8e430b339cf541159f5712e09aa6f550a2296109423d3e

    SHA512

    5d2c1845e88d9da4f3361cc89808e12c71f752a2566426aa7015a620f2a5f854b658e61d15857409a7ef3e2caeb98713ecaac8b0d0ab9df8d78d43b75852b3ce

  • memory/3476-21-0x00000000000F0000-0x000000000011A000-memory.dmp

    Filesize

    168KB

  • memory/3476-22-0x0000000004F00000-0x0000000005518000-memory.dmp

    Filesize

    6.1MB

  • memory/3476-23-0x0000000004A80000-0x0000000004B8A000-memory.dmp

    Filesize

    1.0MB

  • memory/3476-24-0x00000000049B0000-0x00000000049C2000-memory.dmp

    Filesize

    72KB

  • memory/3476-25-0x0000000004A10000-0x0000000004A4C000-memory.dmp

    Filesize

    240KB

  • memory/3476-26-0x0000000004B90000-0x0000000004BDC000-memory.dmp

    Filesize

    304KB