Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 01:59

General

  • Target

    4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e.exe

  • Size

    1.1MB

  • MD5

    ed86411bead0470c1a02f9764c817c3d

  • SHA1

    30d5e0404f959a589bdd8cb279e4d6a08bb319d3

  • SHA256

    4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e

  • SHA512

    fe4c71784944dd45c72788af78a767b4b5d4f8bb3b7b8fcfa2589de29ca1580e94095088a05913f2e83e46c50fd1f509fc25ed37520c295997e4a509dc4be814

  • SSDEEP

    24576:dyo5hG3nov+RSN43eecbfTirocvOK0b9JqCUuif2+XIu:4SG3nsASbecfTuoHJFUui+4I

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e.exe
    "C:\Users\Admin\AppData\Local\Temp\4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4323090.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4323090.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8197261.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8197261.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9069769.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9069769.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4323090.exe

    Filesize

    748KB

    MD5

    9b5624d683825e4a8b146f9c94f9d4cf

    SHA1

    277b7dd8d3c0dfb655430631fae8d3ead6da3711

    SHA256

    7bdaa35aeaa5549a0091e8528273bdfb5e208d9aab727b4bf6004f502d45d2e9

    SHA512

    1352e44f55b9f30a8d0b682ef5b07cbcb49a89e80dbb8deea7ad98caa7b25fa380bd0b8eb92d0fda441a38570a2c8f21c9d7667af16bae223513666c0a1866d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8197261.exe

    Filesize

    304KB

    MD5

    70baf0a7e473c570e52b38780710cf81

    SHA1

    b6b5de3682600e8c553194824b03a4708dd0c271

    SHA256

    acfa70aadd5b0496d4e005f736b0bb0d2094b5a6f27fa9c497e981f17c6c9ab3

    SHA512

    0020f65381705004a4392412d44107f1cbed4b6b93a26871d1118cf682facf8aff081b610dddcd23ceeb9b3695df02886d541eb7321a36d2ad2d16ef97e99044

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9069769.exe

    Filesize

    145KB

    MD5

    caf6c91c4b26b65597343bfe603dbb2b

    SHA1

    5118c715b2812a35270c52caf9db7cbbeb15d5b1

    SHA256

    9708301b7a670b76fa26010d5942847b42e8a8dd68f5e20a04355ef52fbd6884

    SHA512

    6a4d6f763dfcecb0ddb41a2653586efed9b298622ae674abf43bb502d2e677329786feaf3ed1f7de06e3102ef257cb34bd47c545ec638fd69aa12563a324a1de

  • memory/1760-21-0x00000000004D0000-0x00000000004FA000-memory.dmp

    Filesize

    168KB

  • memory/1760-22-0x0000000005420000-0x0000000005A38000-memory.dmp

    Filesize

    6.1MB

  • memory/1760-23-0x0000000004FA0000-0x00000000050AA000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-24-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

    Filesize

    72KB

  • memory/1760-25-0x0000000004F40000-0x0000000004F7C000-memory.dmp

    Filesize

    240KB

  • memory/1760-26-0x00000000050B0000-0x00000000050FC000-memory.dmp

    Filesize

    304KB