Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 20:08

General

  • Target

    ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444.exe

  • Size

    556KB

  • MD5

    97260190c2c11f87f7902c1b8d4928ff

  • SHA1

    f0106260bcc6a68010d1e64d343d6cc8b82b873f

  • SHA256

    ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444

  • SHA512

    bd0a143b80b872d1743b07f755410feb3b2a6977626837c0f32f4a4c5d1ad1877ea66c277717c5d6a6a57c7d97a12cc6bf76aac5910094ac4f887507feba7f47

  • SSDEEP

    12288:kMrly90cHacUq+GX37xncOyimlyJGHxhaGhz1tpfKKs15:hyLX37xncOyKQrhzrE/H

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444.exe
    "C:\Users\Admin\AppData\Local\Temp\ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7322554.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7322554.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8804801.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8804801.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7322554.exe

    Filesize

    384KB

    MD5

    a4278584fe4de55eae9667847d951fb4

    SHA1

    b02674e4443dba9a36ebf603876545ef08aa57db

    SHA256

    9f3061c99e9328f100568021c6e8693d3e927c36d8b59f1c9b41fd943c4ead4b

    SHA512

    ccef24042dec083b90a98fd0569ca862f1f3e1e2156b30dc11b1a0dbd49170b95bf525edeba9554ca3eb259654c1a6a2efa5c40848e7316c6112b65d89ae3e02

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8804801.exe

    Filesize

    168KB

    MD5

    4e85fabe967bdce5805a3bc146c0451f

    SHA1

    c5ed37a9e20f9ca56e060dbf91d4963293da0ecc

    SHA256

    90ae7d847db3b341058946d8d9d04a729fb58f0a51dcddcc2b8c00b083709504

    SHA512

    ec5d44641f667b970dccddfe3fd566a59b20bab76cc64e76cd2133004ed6a954ea8035f1b90910c86ba9eff842d4ce3d946f658ac18c7d62502b08ecba1422da

  • memory/1604-14-0x0000000073E0E000-0x0000000073E0F000-memory.dmp

    Filesize

    4KB

  • memory/1604-15-0x00000000000C0000-0x00000000000F0000-memory.dmp

    Filesize

    192KB

  • memory/1604-16-0x0000000000770000-0x0000000000776000-memory.dmp

    Filesize

    24KB

  • memory/1604-17-0x00000000050E0000-0x00000000056F8000-memory.dmp

    Filesize

    6.1MB

  • memory/1604-18-0x0000000004BD0000-0x0000000004CDA000-memory.dmp

    Filesize

    1.0MB

  • memory/1604-19-0x0000000004A30000-0x0000000004A42000-memory.dmp

    Filesize

    72KB

  • memory/1604-20-0x0000000073E00000-0x00000000745B0000-memory.dmp

    Filesize

    7.7MB

  • memory/1604-21-0x0000000004AC0000-0x0000000004AFC000-memory.dmp

    Filesize

    240KB

  • memory/1604-22-0x0000000004B00000-0x0000000004B4C000-memory.dmp

    Filesize

    304KB

  • memory/1604-23-0x0000000073E0E000-0x0000000073E0F000-memory.dmp

    Filesize

    4KB

  • memory/1604-24-0x0000000073E00000-0x00000000745B0000-memory.dmp

    Filesize

    7.7MB