Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 00:26

General

  • Target

    e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb.exe

  • Size

    480KB

  • MD5

    a8888afdb2e964791fde75cc7344a66b

  • SHA1

    630c74ddac41a749941e7f7b769202fb6f4f462a

  • SHA256

    e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb

  • SHA512

    bb6fc4333ec3b88466beba09547b10283cc2e6abe8369f4827eb3d5c3ac6aed8639b48361d027aa46cb47aa2a83355fb549c813a22ec0faaa3c6f5f93e058a8f

  • SSDEEP

    12288:DMrAy90cXQu9gXSqfh/aeYGBK0SLM62Nn:zyNYSqtBYGBKgx

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb.exe
    "C:\Users\Admin\AppData\Local\Temp\e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8985444.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8985444.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7230738.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7230738.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8985444.exe

    Filesize

    308KB

    MD5

    72dc922360597c02c0661e960eb444e0

    SHA1

    49b79bc49ba15a636054cf0e329c5c3b48990f5d

    SHA256

    0dc6fe10f8d0618dacca8b724d1527db029925bb90e25036bb9f39fca380e5ee

    SHA512

    cab4097dcddb5843e60b0da1d8fdd4bd5ff16567499f2fda023fe8816c254818ff29f302ad75f5f3b0922390c3f18d3581f5a3aa32c8166d9793408d3bda329d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7230738.exe

    Filesize

    168KB

    MD5

    3ee9630058761a6d107e2f82dee6486d

    SHA1

    d34b1278bd31e5ba8a93a10b64ac56dd1c16f5c0

    SHA256

    fd9f7fcc8101eed7636b008190879f36fa101947c53103cbad1fe00ea1331f86

    SHA512

    a85ad1ebf87a743e624f314562da1dc490aeeaee86403185f8fa60973690672d4e244b30d1249f905970ce33a5aaad57137bacb24a66178d4fbd1b59a9298744

  • memory/3596-14-0x00000000742DE000-0x00000000742DF000-memory.dmp

    Filesize

    4KB

  • memory/3596-15-0x0000000000820000-0x0000000000850000-memory.dmp

    Filesize

    192KB

  • memory/3596-16-0x00000000010A0000-0x00000000010A6000-memory.dmp

    Filesize

    24KB

  • memory/3596-17-0x0000000005800000-0x0000000005E18000-memory.dmp

    Filesize

    6.1MB

  • memory/3596-18-0x00000000052F0000-0x00000000053FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3596-19-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3596-20-0x0000000005220000-0x000000000525C000-memory.dmp

    Filesize

    240KB

  • memory/3596-21-0x00000000742D0000-0x0000000074A80000-memory.dmp

    Filesize

    7.7MB

  • memory/3596-22-0x0000000005260000-0x00000000052AC000-memory.dmp

    Filesize

    304KB

  • memory/3596-23-0x00000000742DE000-0x00000000742DF000-memory.dmp

    Filesize

    4KB

  • memory/3596-24-0x00000000742D0000-0x0000000074A80000-memory.dmp

    Filesize

    7.7MB