Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:35

General

  • Target

    e3a315406a1e36ee63cc1953f99e6306c1fac8f66a7063d5e0672d56e97e6914.exe

  • Size

    632KB

  • MD5

    11579075813469d9df2db396cf92f1de

  • SHA1

    a8ceaafee8287239d20adc1039811a2a2184adf1

  • SHA256

    e3a315406a1e36ee63cc1953f99e6306c1fac8f66a7063d5e0672d56e97e6914

  • SHA512

    4ef1f905ad9d5f7d7d5325fbd74fb29c8cb03025046537cb1d090406181d7128e0bb0aafa3f9d625c30dcd9e076a62ea86445d9e4202cd92a0ce429039816b7c

  • SSDEEP

    12288:/MrWy90mCKMsTM5vJl0CK5ZiEl6WnfB41vMIUDi:5y3CKMj6dmGp4WIUDi

Malware Config

Extracted

Family

redline

Botnet

bilod

C2

193.233.20.7:4138

Attributes
  • auth_value

    407a8c8d5a1f9a3348afc8c6b0155512

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3a315406a1e36ee63cc1953f99e6306c1fac8f66a7063d5e0672d56e97e6914.exe
    "C:\Users\Admin\AppData\Local\Temp\e3a315406a1e36ee63cc1953f99e6306c1fac8f66a7063d5e0672d56e97e6914.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cBrn.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cBrn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aBrx.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aBrx.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cBrn.exe

    Filesize

    445KB

    MD5

    c59a7b24232ef6375403f4e3e29714c2

    SHA1

    c4c1e8abf8795c23a55642b5f8a6fa9ea8c9cd32

    SHA256

    d7013bac76b9d7cca809400afa295bc966cd40b09830dd2b9525470e0e236377

    SHA512

    8b5260f00556fac613736e2cf12f0b93d81504e3a576c840c5a25e0fd7a3338c31252a7852629e39de61283f0e99ec3997c1899cd7638215bbfacdfbf4650b70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aBrx.exe

    Filesize

    406KB

    MD5

    a3ea7ddc9568c1c7fc4bc205e0714a40

    SHA1

    e8328c960e000c606b36a3887bc5d154afcfc141

    SHA256

    b9592f7616249ff910d601c0680932abf55a8b4af511bf18d42ad55835f422d4

    SHA512

    279e2caf4085de062f07efa10378fb010f382abb0c555b6f56c7439317b5fff7c8ab3a7646620b6e8834647acba78ee06cd5a4bd377dffc41303448c89dcbf8f

  • memory/4388-15-0x0000000000620000-0x0000000000720000-memory.dmp

    Filesize

    1024KB

  • memory/4388-16-0x0000000002000000-0x000000000204B000-memory.dmp

    Filesize

    300KB

  • memory/4388-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4388-18-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/4388-19-0x0000000004B70000-0x0000000004BB6000-memory.dmp

    Filesize

    280KB

  • memory/4388-20-0x0000000004C00000-0x00000000051A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4388-21-0x00000000051B0000-0x00000000051F4000-memory.dmp

    Filesize

    272KB

  • memory/4388-35-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-31-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-39-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-85-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-81-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-79-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-77-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-75-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-73-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-71-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-69-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-65-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-63-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-61-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-60-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-57-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-55-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-53-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-51-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-47-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-43-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-41-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-37-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-33-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-83-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-67-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-49-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-45-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-29-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-27-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-25-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-23-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-22-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4388-928-0x00000000051F0000-0x0000000005808000-memory.dmp

    Filesize

    6.1MB

  • memory/4388-929-0x0000000005890000-0x000000000599A000-memory.dmp

    Filesize

    1.0MB

  • memory/4388-930-0x00000000059D0000-0x00000000059E2000-memory.dmp

    Filesize

    72KB

  • memory/4388-931-0x00000000059F0000-0x0000000005A2C000-memory.dmp

    Filesize

    240KB

  • memory/4388-932-0x0000000005B40000-0x0000000005B8C000-memory.dmp

    Filesize

    304KB

  • memory/4388-933-0x0000000000620000-0x0000000000720000-memory.dmp

    Filesize

    1024KB

  • memory/4388-934-0x0000000002000000-0x000000000204B000-memory.dmp

    Filesize

    300KB

  • memory/4388-935-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB