Analysis

  • max time kernel
    105s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/11/2024, 23:17

General

  • Target

    b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226N.exe

  • Size

    168KB

  • MD5

    046e0dd611d7a7c86d59208f1c7ad460

  • SHA1

    b2d2d020098ba93dd78275ecb4297b3e56e04958

  • SHA256

    b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226

  • SHA512

    74c9a4473b2e05e4c8c859361b6ec3c7ffbe2516d4e71df8ea39b80ffd9b9704446492b285f62534c3ab3d330e58480dbf01086ae34faa42052af435a53ee4b1

  • SSDEEP

    1536:B2jfFmdp7a8GOqlVZRGWCSz9rVwyDTqGCwjh6D8TGqVebu+wR6A38Mg83wYkh8eU:wFKp7aROeYmTHgqVquJ38Mg78e8hN

Malware Config

Extracted

Family

redline

Botnet

luser

C2

185.161.248.73:4164

Attributes
  • auth_value

    cf14a84de9a3b6b7b8981202f3b616fb

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226N.exe
    "C:\Users\Admin\AppData\Local\Temp\b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2472-0-0x000000007432E000-0x000000007432F000-memory.dmp

    Filesize

    4KB

  • memory/2472-1-0x0000000000B40000-0x0000000000B6E000-memory.dmp

    Filesize

    184KB

  • memory/2472-2-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB

  • memory/2472-3-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2472-4-0x000000007432E000-0x000000007432F000-memory.dmp

    Filesize

    4KB

  • memory/2472-5-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB