Analysis

  • max time kernel
    106s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:17

General

  • Target

    b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226N.exe

  • Size

    168KB

  • MD5

    046e0dd611d7a7c86d59208f1c7ad460

  • SHA1

    b2d2d020098ba93dd78275ecb4297b3e56e04958

  • SHA256

    b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226

  • SHA512

    74c9a4473b2e05e4c8c859361b6ec3c7ffbe2516d4e71df8ea39b80ffd9b9704446492b285f62534c3ab3d330e58480dbf01086ae34faa42052af435a53ee4b1

  • SSDEEP

    1536:B2jfFmdp7a8GOqlVZRGWCSz9rVwyDTqGCwjh6D8TGqVebu+wR6A38Mg83wYkh8eU:wFKp7aROeYmTHgqVquJ38Mg78e8hN

Malware Config

Extracted

Family

redline

Botnet

luser

C2

185.161.248.73:4164

Attributes
  • auth_value

    cf14a84de9a3b6b7b8981202f3b616fb

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226N.exe
    "C:\Users\Admin\AppData\Local\Temp\b1730d716a7fb512a049cd728b801a5b76ce7cac1505c3a9328e5ce5b2a15226N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2432-0-0x000000007498E000-0x000000007498F000-memory.dmp

    Filesize

    4KB

  • memory/2432-1-0x0000000000780000-0x00000000007AE000-memory.dmp

    Filesize

    184KB

  • memory/2432-2-0x0000000002A90000-0x0000000002A96000-memory.dmp

    Filesize

    24KB

  • memory/2432-3-0x0000000005920000-0x0000000005F38000-memory.dmp

    Filesize

    6.1MB

  • memory/2432-4-0x0000000005410000-0x000000000551A000-memory.dmp

    Filesize

    1.0MB

  • memory/2432-5-0x0000000005120000-0x0000000005132000-memory.dmp

    Filesize

    72KB

  • memory/2432-7-0x0000000074980000-0x0000000075130000-memory.dmp

    Filesize

    7.7MB

  • memory/2432-6-0x0000000005180000-0x00000000051BC000-memory.dmp

    Filesize

    240KB

  • memory/2432-8-0x0000000005300000-0x000000000534C000-memory.dmp

    Filesize

    304KB

  • memory/2432-9-0x000000007498E000-0x000000007498F000-memory.dmp

    Filesize

    4KB

  • memory/2432-10-0x0000000074980000-0x0000000075130000-memory.dmp

    Filesize

    7.7MB