Analysis

  • max time kernel
    132s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 07:55

General

  • Target

    641075714299b5050da22b4803d1a37b838b913e90d02a7ae90728660cb34585.exe

  • Size

    479KB

  • MD5

    b53d960a07e96c62e32d9fe22b04b218

  • SHA1

    93f1c9df82556b3f266d8e57cbbe749ac2f5d5e5

  • SHA256

    641075714299b5050da22b4803d1a37b838b913e90d02a7ae90728660cb34585

  • SHA512

    0888bc118deb2cd7ed9afc9f21be22f288217e840c35357dfa90c1cb97c922b050525988dc1b14f11247b1222a83a9cb81a248606697eb98dd974e314a441cd2

  • SSDEEP

    12288:qMrQy90uNTrDQMtuOsIYhHlLjUgtGIcbUcV:uyV3cMtufLGIcxV

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\641075714299b5050da22b4803d1a37b838b913e90d02a7ae90728660cb34585.exe
    "C:\Users\Admin\AppData\Local\Temp\641075714299b5050da22b4803d1a37b838b913e90d02a7ae90728660cb34585.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4509316.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4509316.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9435563.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9435563.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4509316.exe

    Filesize

    308KB

    MD5

    f4e4264e2525898fb9d9624fa2ffe291

    SHA1

    7ed2d8d41e8d6028a4e1c110199fb54e9878cc69

    SHA256

    f4e53f91dd5412f70f69039b570c35f913f15e5d734c1a5c2d95de82103a5f3f

    SHA512

    16d8e9df22b4d87e10f4dbbc35c0d05edbd9b8e92040cb0cd9eedeaa68818a862b31b05085fa725531c25dd613681fad994ff0ec94dbb01d4d62d756e8d8c12e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9435563.exe

    Filesize

    168KB

    MD5

    5016d095bff406be0efff6e3a8af924e

    SHA1

    c6b428914b9fcf67326f0c237f0e2e93893eebd2

    SHA256

    7bd84cc4ba48f7c77eb8536da180ec3160d89903cf0c81cdec03b26b97183508

    SHA512

    22fea35cdf9f284ef8f7a74521816210e2c85d16048ecb9848dba33a8d4d435f7bab2ecab8286da0a59c7bd8d0b00acaa836ff2fe4c25adadf7e3e6ac5a3e442

  • memory/1060-14-0x000000007470E000-0x000000007470F000-memory.dmp

    Filesize

    4KB

  • memory/1060-15-0x0000000000F10000-0x0000000000F40000-memory.dmp

    Filesize

    192KB

  • memory/1060-16-0x00000000032E0000-0x00000000032E6000-memory.dmp

    Filesize

    24KB

  • memory/1060-17-0x000000000B2E0000-0x000000000B8F8000-memory.dmp

    Filesize

    6.1MB

  • memory/1060-18-0x000000000ADD0000-0x000000000AEDA000-memory.dmp

    Filesize

    1.0MB

  • memory/1060-19-0x000000000ACC0000-0x000000000ACD2000-memory.dmp

    Filesize

    72KB

  • memory/1060-20-0x000000000ACE0000-0x000000000AD1C000-memory.dmp

    Filesize

    240KB

  • memory/1060-21-0x0000000074700000-0x0000000074EB0000-memory.dmp

    Filesize

    7.7MB

  • memory/1060-22-0x00000000030C0000-0x000000000310C000-memory.dmp

    Filesize

    304KB

  • memory/1060-23-0x000000007470E000-0x000000007470F000-memory.dmp

    Filesize

    4KB

  • memory/1060-24-0x0000000074700000-0x0000000074EB0000-memory.dmp

    Filesize

    7.7MB