Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 04:39

General

  • Target

    acb4b2770caf496876797b2181d9690f92e610d5513d57574cc83296ae06c10a.exe

  • Size

    479KB

  • MD5

    cac900fe7277a00749371af65a250edc

  • SHA1

    908e26c246d6760963dfdbe24f5e3f9d6120a4f8

  • SHA256

    acb4b2770caf496876797b2181d9690f92e610d5513d57574cc83296ae06c10a

  • SHA512

    9295b6f5d0240e42330cc64090c833fbfecc2c0896c3a3072588cd621b6922c84124e2613d40604571fdcdff83dfe394ae5e351ccf9770b7b40ce417c56b8d36

  • SSDEEP

    6144:KUy+bnr+ap0yN90QE7P9NCZ7EBGu2EVBllr/yvtB5CrEdpYDekUPbwpHBXG0Kr3a:AMruy90ZXu7EBj3lLyvzaASZhXD3F

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acb4b2770caf496876797b2181d9690f92e610d5513d57574cc83296ae06c10a.exe
    "C:\Users\Admin\AppData\Local\Temp\acb4b2770caf496876797b2181d9690f92e610d5513d57574cc83296ae06c10a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9116007.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9116007.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8758296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8758296.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9116007.exe

    Filesize

    308KB

    MD5

    e217cf2ee17cc8084f944ec6615630d8

    SHA1

    8bef609e3a28bb67a494718ba753c1858a7acc72

    SHA256

    7522ae1996811b7d25481d137a583b97026a8b151e5d5c0474e42b36df228660

    SHA512

    80c850de67ec17d033c200152cf568124d91cdd6ec572646d91902e211f40e44505a54676d1d514bb055ca2424c46d282beec69ef95f17261861785c1230dc19

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8758296.exe

    Filesize

    168KB

    MD5

    2686ac6e78319f6f32cac9c2f9fdc10b

    SHA1

    c5cf1b90fe712d89e868863ce7102389d2369d56

    SHA256

    16e949092112cf8cf8cbdfef2dd3e7b2ceeec110d1a0a7905ffd6928157bfcec

    SHA512

    7abd5ed58224fddd7902c3235f2daeacc5f76a0d7dfa88a94b816e95a83c9a74323ae5c5185d90fe5ae823787cfa89700e70c42a241fd8ea8824a6ca7bb5ea4c

  • memory/4268-14-0x000000007467E000-0x000000007467F000-memory.dmp

    Filesize

    4KB

  • memory/4268-15-0x0000000000890000-0x00000000008C0000-memory.dmp

    Filesize

    192KB

  • memory/4268-16-0x0000000002B80000-0x0000000002B86000-memory.dmp

    Filesize

    24KB

  • memory/4268-17-0x000000000ABD0000-0x000000000B1E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4268-18-0x000000000A700000-0x000000000A80A000-memory.dmp

    Filesize

    1.0MB

  • memory/4268-19-0x000000000A630000-0x000000000A642000-memory.dmp

    Filesize

    72KB

  • memory/4268-20-0x0000000074670000-0x0000000074E20000-memory.dmp

    Filesize

    7.7MB

  • memory/4268-21-0x000000000A690000-0x000000000A6CC000-memory.dmp

    Filesize

    240KB

  • memory/4268-22-0x0000000004BC0000-0x0000000004C0C000-memory.dmp

    Filesize

    304KB

  • memory/4268-23-0x000000007467E000-0x000000007467F000-memory.dmp

    Filesize

    4KB

  • memory/4268-24-0x0000000074670000-0x0000000074E20000-memory.dmp

    Filesize

    7.7MB