Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 09:20

General

  • Target

    a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8.exe

  • Size

    469KB

  • MD5

    98b9e992abde4c434996bcff151c3af4

  • SHA1

    1affcb38c2a67c11e810856d2a39e28bbea7309e

  • SHA256

    a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8

  • SHA512

    35be54b9faef939acfe6e99bfd84f157f4d7d68f00bd65608d775a5c7876b8a9974f0f9cba5c5500c4beac9415e564170d0b8c6644d561c285ce0f5a228b5f81

  • SSDEEP

    6144:KIy+bnr+dp0yN90QEJ+5FnR6X+oPZVqPSY1kqIU784jUNFMYHhE6FuY3Nh1ax58g:wMrJy90qS+utSkq4NGhRF7ibSiWnV5f

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8.exe
    "C:\Users\Admin\AppData\Local\Temp\a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nqZ54.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nqZ54.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bkj33.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bkj33.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nqZ54.exe

    Filesize

    202KB

    MD5

    39db483c915bbab90e0cb9fd91d37377

    SHA1

    3ee82ac74e754a8f255484c085934c5fd17fd3cc

    SHA256

    6e8c8736ffb66b3e75f15586e5c092ad5f0bb912c533dbd9d22fa05eec1ab46e

    SHA512

    7a83db121ecc80a16c6869733612e742f3880efe8be28593145079e19285264a0b76c86c8c06bcdf1f4a28b6cd39bfe63e3ba9f5e9bdc950b4a053f31db09c20

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bkj33.exe

    Filesize

    175KB

    MD5

    a5f5c5d6291c7ae9e1d1b7ed1e551490

    SHA1

    3d06413341893b838549939e15f8f1eec423d71a

    SHA256

    1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

    SHA512

    d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

  • memory/4284-14-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB

  • memory/4284-15-0x0000000000020000-0x0000000000052000-memory.dmp

    Filesize

    200KB

  • memory/4284-16-0x0000000004FD0000-0x00000000055E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4284-17-0x0000000004B00000-0x0000000004C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4284-18-0x0000000004A40000-0x0000000004A52000-memory.dmp

    Filesize

    72KB

  • memory/4284-19-0x0000000004AA0000-0x0000000004ADC000-memory.dmp

    Filesize

    240KB

  • memory/4284-20-0x0000000004C10000-0x0000000004C5C000-memory.dmp

    Filesize

    304KB

  • memory/4284-21-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB