Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 02:34 UTC

General

  • Target

    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe

  • Size

    370KB

  • MD5

    835937927e04c27c55b7477fc690e9d9

  • SHA1

    6bd5555c2150baabb634df971fe67f09c4ad63b5

  • SHA256

    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01

  • SHA512

    f278d6a8d15c08f68a1ff24c60a82487ec0f8def1e979f6896ac335697566897d8ddc6b6d1b8433147552e496fd3a94e90d699235e476c17beb58363227a76a5

  • SSDEEP

    6144:5aq04PVZTOVCKCvwhMxR2HqOvobcjgw3DBMN9S0WLBfgb7ITsqXigaXwVfi:5aq04PvJDwex4HqTbckoti9wtfA7R

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe
    "C:\Users\Admin\AppData\Local\Temp\fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:3780

Network

  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    217.106.137.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.106.137.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    69.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    69.190.18.2.in-addr.arpa
    IN PTR
    Response
    69.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-69deploystaticakamaitechnologiescom
  • flag-us
    DNS
    23.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 45.9.20.59:46287
    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe
    260 B
    5
  • 45.9.20.59:46287
    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe
    260 B
    5
  • 45.9.20.59:46287
    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe
    260 B
    5
  • 45.9.20.59:46287
    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe
    260 B
    5
  • 45.9.20.59:46287
    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe
    260 B
    5
  • 45.9.20.59:46287
    fbd96c4909b73c96ee8e17e75e1dd91d4201128ea5a8a0f97a2aa92e32a7ab01.exe
    260 B
    5
  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    73.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    73.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    217.106.137.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    217.106.137.52.in-addr.arpa

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    69.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    69.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    23.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    23.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3780-0-0x00000000048E0000-0x000000000490B000-memory.dmp

    Filesize

    172KB

  • memory/3780-1-0x0000000004910000-0x0000000004949000-memory.dmp

    Filesize

    228KB

  • memory/3780-2-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3780-3-0x0000000004AF0000-0x0000000004B24000-memory.dmp

    Filesize

    208KB

  • memory/3780-4-0x0000000007520000-0x0000000007AC4000-memory.dmp

    Filesize

    5.6MB

  • memory/3780-5-0x0000000004C70000-0x0000000004CA2000-memory.dmp

    Filesize

    200KB

  • memory/3780-6-0x0000000000400000-0x0000000002B95000-memory.dmp

    Filesize

    39.6MB

  • memory/3780-7-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-70-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-68-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-66-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-64-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-62-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-60-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-58-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-56-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-54-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-52-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-48-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-46-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-44-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-42-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-40-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-38-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-36-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-34-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-30-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-28-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-27-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-22-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-20-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-18-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-17-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-14-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-12-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-10-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-50-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-32-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-24-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-8-0x0000000004C70000-0x0000000004C9C000-memory.dmp

    Filesize

    176KB

  • memory/3780-959-0x00000000073E0000-0x00000000074EA000-memory.dmp

    Filesize

    1.0MB

  • memory/3780-958-0x00000000073C0000-0x00000000073D2000-memory.dmp

    Filesize

    72KB

  • memory/3780-957-0x0000000007AD0000-0x00000000080E8000-memory.dmp

    Filesize

    6.1MB

  • memory/3780-960-0x00000000080F0000-0x000000000812C000-memory.dmp

    Filesize

    240KB

  • memory/3780-961-0x0000000008160000-0x00000000081AC000-memory.dmp

    Filesize

    304KB

  • memory/3780-962-0x00000000048E0000-0x000000000490B000-memory.dmp

    Filesize

    172KB

  • memory/3780-963-0x0000000004910000-0x0000000004949000-memory.dmp

    Filesize

    228KB

  • memory/3780-965-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.