Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 22:10

General

  • Target

    9b9fbe39d9cbbe1660b5ec01fb01a32e5913502def2fdec4162c22a3737a76cb.exe

  • Size

    1.1MB

  • MD5

    dc93f4cedfa49f3595bf2d04433f955d

  • SHA1

    25d5f1e932daf3cc31c436dcb68dc81e3482be78

  • SHA256

    9b9fbe39d9cbbe1660b5ec01fb01a32e5913502def2fdec4162c22a3737a76cb

  • SHA512

    c88a379d1a32c6ff53832b5c608d23177494d21208fb7b211f189c57d234c01734db772e9344bc7b8e684ce59fb19d7a9ac20e003c9f712780b4a3232d8b7fc9

  • SSDEEP

    24576:TyGL2Xu2d+XnA1WBinl0WzjM4JD+jawsloaLmDI:mGL2Xn6A1WglHJDsVsl/LE

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b9fbe39d9cbbe1660b5ec01fb01a32e5913502def2fdec4162c22a3737a76cb.exe
    "C:\Users\Admin\AppData\Local\Temp\9b9fbe39d9cbbe1660b5ec01fb01a32e5913502def2fdec4162c22a3737a76cb.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4982544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4982544.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3694168.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3694168.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9887556.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9887556.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4982544.exe

    Filesize

    748KB

    MD5

    3171ab48d0918527f0a7d553a6fd0f5e

    SHA1

    92c24c4f4bf85803a85cb4ebb224124460d0af3a

    SHA256

    865ee661daec7ec3ba94843fba98489324df50ada597dc25962760561fa809e3

    SHA512

    59bd9c2918e208e6d40c866ed4574461cfc7b450d8e97b118dc02eac9b1292e15d8920b2641d18b1bf067ade1230172c5e82f66bdae2cd13fa7150e36a4e7f67

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3694168.exe

    Filesize

    304KB

    MD5

    daee09ee0db5ba25b8511e583ce46576

    SHA1

    cfdbcc809f57348b1479914bd83c25b16706cea8

    SHA256

    f98599c5b5d7e68c11e0005e704a625166abc76133f8fa3460ddde3af8979d44

    SHA512

    7e8f469a5e07cb8480ebde6295e89d5ac129725e215cbdadce11b0e92103663fda14097fb99bf1a09c95bc77018ac35529f3e8f099f2877478f804406e9322a6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9887556.exe

    Filesize

    145KB

    MD5

    b608631cf36b66745a8d4c1208222ba7

    SHA1

    9100768fac7996f1befd8e096a502256f03f0cc7

    SHA256

    364861aa088dd8143d4e485e3e8cfe0fcdb14832290d39a2ba7edede522ff9f3

    SHA512

    0459faca91eb492575c30bb3c0b995c05d9f70342d835442da906888cead07dca7900426fc1091edb0c377dc8cf3415caf2febd5279901247c504de254614c7f

  • memory/424-21-0x0000000000B20000-0x0000000000B4A000-memory.dmp

    Filesize

    168KB

  • memory/424-22-0x0000000005930000-0x0000000005F48000-memory.dmp

    Filesize

    6.1MB

  • memory/424-23-0x00000000054B0000-0x00000000055BA000-memory.dmp

    Filesize

    1.0MB

  • memory/424-24-0x00000000053E0000-0x00000000053F2000-memory.dmp

    Filesize

    72KB

  • memory/424-25-0x0000000005440000-0x000000000547C000-memory.dmp

    Filesize

    240KB

  • memory/424-26-0x00000000055C0000-0x000000000560C000-memory.dmp

    Filesize

    304KB