Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 22:20

General

  • Target

    be439ae90d6760ff5519bdcd9227ab4d5507a421.exe

  • Size

    407KB

  • MD5

    1b0c28179d9631d501c4da30127be6df

  • SHA1

    be439ae90d6760ff5519bdcd9227ab4d5507a421

  • SHA256

    c567542461a09b5f4bc03188eddf5cca5f7eac25dedf0e8f981e4d7b9f3d0b19

  • SHA512

    b204dc1f58e416e70b1f5bfc4046272ed3ed188b49fb3e135cecd143f0c8b8e6d0746ca5d21bdd0367861bc9c8a3d20ebe6a29934f947f9e6493ed27aba7dac0

  • SSDEEP

    12288:uzJu9nus9Nyb3RFcpknNt1/l3TukAcbaa:Gs9NCpnNt1/BqU

Malware Config

Extracted

Family

redline

Botnet

ww

C2

193.106.191.67:44400

Attributes
  • auth_value

    5a1b28ccd05953f5c3f99729c12427cc

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be439ae90d6760ff5519bdcd9227ab4d5507a421.exe
    "C:\Users\Admin\AppData\Local\Temp\be439ae90d6760ff5519bdcd9227ab4d5507a421.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2084-1-0x00000000008F0000-0x00000000009F0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-2-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2084-3-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2084-4-0x0000000002070000-0x00000000020A4000-memory.dmp

    Filesize

    208KB

  • memory/2084-5-0x00000000020F0000-0x0000000002122000-memory.dmp

    Filesize

    200KB

  • memory/2084-6-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-7-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-9-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-37-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-33-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-29-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-25-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-21-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-17-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-65-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-11-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-14-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-15-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-70-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-67-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-63-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-61-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-59-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-57-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-55-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-53-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-51-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-49-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-47-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-45-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-43-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-41-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-39-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-35-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-31-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-27-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-23-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-19-0x00000000020F0000-0x000000000211D000-memory.dmp

    Filesize

    180KB

  • memory/2084-960-0x00000000008F0000-0x00000000009F0000-memory.dmp

    Filesize

    1024KB