Analysis

  • max time kernel
    136s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:42

General

  • Target

    6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe

  • Size

    774KB

  • MD5

    025015cb5a6c57a111d9ba698939e112

  • SHA1

    29d5af2dc20844d26802c603b4959054b9146afe

  • SHA256

    6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d

  • SHA512

    c133c0a136bc1228329ffa903bf1d20858d7ccabaf77f416d53961343d9b6212afbcad8305ecb160eb1b8c226b2457fa1965fd52e7f3767eecebad6f71c27445

  • SSDEEP

    24576:ZyVUL5jbD1BK3PdB4Soyq80cahDVwFxCrWx:MVUVjHK/dUd801hBMxCr

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x57157763.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x57157763.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m99295296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m99295296.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3948
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n65398622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n65398622.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x57157763.exe

    Filesize

    570KB

    MD5

    1e5d5657fbfad0cbe75de2a97ca7f4c6

    SHA1

    53d54825e8b016f5919004e859c9cbdec4ee2090

    SHA256

    9ec069204aae197f7420b6a08129a5e36c3a7b6fd6764aed6bba282a1126311d

    SHA512

    f5427ba61320fc8cec74dba79bad38fd788ff13164779f110c0379528e8edfe4d72a1aeb84c83d83dd8901403ddcfee35d9553a838c0cebf6910c18fba0a0a3e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m99295296.exe

    Filesize

    476KB

    MD5

    b92b4cdc2e1edfe7572050749c67ac8b

    SHA1

    90be51b502a6d82a4845c7499ae6aa54b846fb69

    SHA256

    501cff4fc83c9acbd0c65325e725460d9c997d698271e562091cf841d0e1bc58

    SHA512

    9c03738d4b7a1b5282ed135693acc01c7d0799a4e60547fa4f64b34ee43b127778c1b7dd0c2abcc8079c5738e9dd5c070cbf00cdbae3760dcab8d02467ffbc5d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n65398622.exe

    Filesize

    169KB

    MD5

    667c10e2becfcf8f5c62c2a0700f3a34

    SHA1

    37ed79ca6631b59d8a915e091ad50dd3c61462f4

    SHA256

    e5ca0e15f5d26a3a870e9fdb67d0fb14bd49f171adbc2b83d42499a9f2662ff0

    SHA512

    4731bcf6c14f40ec6b5ed8a6cbd6c3dc7f9275898c52371398b77627c4568a1c263c56200b3596e685a750ae12cf7a86d7cf8a302b3be893df682ec0ab0a41b1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/2544-2191-0x0000000000FF0000-0x0000000001020000-memory.dmp

    Filesize

    192KB

  • memory/2544-2192-0x00000000016D0000-0x00000000016D6000-memory.dmp

    Filesize

    24KB

  • memory/2544-2193-0x0000000005FA0000-0x00000000065B8000-memory.dmp

    Filesize

    6.1MB

  • memory/2544-2197-0x0000000005A10000-0x0000000005A5C000-memory.dmp

    Filesize

    304KB

  • memory/2544-2196-0x00000000059A0000-0x00000000059DC000-memory.dmp

    Filesize

    240KB

  • memory/3948-57-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-45-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-19-0x0000000002840000-0x00000000028A8000-memory.dmp

    Filesize

    416KB

  • memory/3948-20-0x0000000004E70000-0x0000000005414000-memory.dmp

    Filesize

    5.6MB

  • memory/3948-21-0x00000000028C0000-0x0000000002926000-memory.dmp

    Filesize

    408KB

  • memory/3948-33-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-39-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-85-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-83-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-81-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-79-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-77-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-75-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-73-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-71-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-69-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-65-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-63-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-59-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-17-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/3948-56-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-53-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-51-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-50-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-47-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-18-0x0000000000400000-0x00000000006F8000-memory.dmp

    Filesize

    3.0MB

  • memory/3948-43-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-41-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-37-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-35-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-31-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-29-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-27-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-25-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-23-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-67-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-61-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-22-0x00000000028C0000-0x0000000002920000-memory.dmp

    Filesize

    384KB

  • memory/3948-2168-0x0000000000750000-0x0000000000850000-memory.dmp

    Filesize

    1024KB

  • memory/3948-2169-0x0000000005610000-0x0000000005642000-memory.dmp

    Filesize

    200KB

  • memory/3948-2183-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/3948-2184-0x0000000000940000-0x000000000099B000-memory.dmp

    Filesize

    364KB

  • memory/3948-2185-0x0000000000400000-0x00000000006F8000-memory.dmp

    Filesize

    3.0MB

  • memory/3948-15-0x0000000000750000-0x0000000000850000-memory.dmp

    Filesize

    1024KB

  • memory/3948-16-0x0000000000940000-0x000000000099B000-memory.dmp

    Filesize

    364KB

  • memory/4200-2194-0x0000000004E60000-0x0000000004F6A000-memory.dmp

    Filesize

    1.0MB

  • memory/4200-2195-0x0000000004D70000-0x0000000004D82000-memory.dmp

    Filesize

    72KB

  • memory/4200-2190-0x0000000004C10000-0x0000000004C16000-memory.dmp

    Filesize

    24KB

  • memory/4200-2186-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB