Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 01:45

General

  • Target

    52e88e67cc50860ef051810ffcabd67bd50c38b6b2b006d4e5293d7a93125eee.exe

  • Size

    556KB

  • MD5

    53d6f95a21e4a1367e3e553c2e6337a6

  • SHA1

    1907a278136a01fb8dfc3ca5ad878d2d675c1ceb

  • SHA256

    52e88e67cc50860ef051810ffcabd67bd50c38b6b2b006d4e5293d7a93125eee

  • SHA512

    2ee480cd24bb747813abf4e56ab793686a454c49d0d151b572808b270536aac5f475626ce42ca2378a35e75a95cdbcca99051f5918c6ea96a9cfc33a0f739ea0

  • SSDEEP

    12288:4MrRy90i9XPFSh7N520KNsoPI2DSrJx6088r3ltTioqp:py1FShpI0GA2DaJ4D63u1

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52e88e67cc50860ef051810ffcabd67bd50c38b6b2b006d4e5293d7a93125eee.exe
    "C:\Users\Admin\AppData\Local\Temp\52e88e67cc50860ef051810ffcabd67bd50c38b6b2b006d4e5293d7a93125eee.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1062748.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1062748.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0405427.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0405427.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1062748.exe

    Filesize

    384KB

    MD5

    357b48a6418a524c9aa121feeb98030d

    SHA1

    ebcde15e67e2311139c88928e928eed87f5372f0

    SHA256

    f07f5f1b1a382b63a53c299fa889bc49c7f16538cffeb58aef915295d7a401e2

    SHA512

    64f36d11fcf3f17dd4d985d71c743707f7db4bb28b8285708b7bc35f38f64c1f9a69d496e300d85f99d29c7121263e51de31fbf61f7fab440024f336347452dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0405427.exe

    Filesize

    168KB

    MD5

    ea0003f9916a18e4cd3dc1b9ae3b6d32

    SHA1

    1b2cd0680a53607e5773017ee6d1e84ff4c437ec

    SHA256

    bba9eca203a8f1dc96e0f08a8f75a922cf3b25908698ba3b1b0cebf59aba35f5

    SHA512

    8a12205c1bdc1e6e3c54c3123215898ed5d71623c2e7616567d3b85b2cbde9698909a3e8a4e34df301f0a8c9eaee3d17a6a06c1ed0171efb0e2e23b3bfabdfff

  • memory/4936-14-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB

  • memory/4936-15-0x00000000007A0000-0x00000000007D0000-memory.dmp

    Filesize

    192KB

  • memory/4936-16-0x00000000050C0000-0x00000000050C6000-memory.dmp

    Filesize

    24KB

  • memory/4936-17-0x000000000AAF0000-0x000000000B108000-memory.dmp

    Filesize

    6.1MB

  • memory/4936-18-0x000000000A610000-0x000000000A71A000-memory.dmp

    Filesize

    1.0MB

  • memory/4936-19-0x000000000A540000-0x000000000A552000-memory.dmp

    Filesize

    72KB

  • memory/4936-21-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4936-20-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

    Filesize

    240KB

  • memory/4936-22-0x0000000004A70000-0x0000000004ABC000-memory.dmp

    Filesize

    304KB

  • memory/4936-23-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB

  • memory/4936-24-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB