Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 12:54

General

  • Target

    438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70.exe

  • Size

    567KB

  • MD5

    e0999dcc531cfb516f980a487ddb1af1

  • SHA1

    a6de483386fc3ea1290078b8e71a794f1e197c5b

  • SHA256

    438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70

  • SHA512

    b71f42ad22134e40fd451eb17fec28d239c8c8bea875438754645ce8db0522808e2afa252c29c3ec78b265c53e81e58039fd9ab3aa2ec0116f492ca1a09a7aaa

  • SSDEEP

    12288:1Mrly90X9JqejkrzsGnaQnff0Jn687RcBBoqzle+M0rl:0yq2/VnaQ0CBhle+7h

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70.exe
    "C:\Users\Admin\AppData\Local\Temp\438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3944226.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3944226.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3465855.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3465855.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3944226.exe

    Filesize

    307KB

    MD5

    c658b0bb2e6243c12216ac387db2ffc7

    SHA1

    910446e99c8b53296225df51694f4d99bb4fab96

    SHA256

    c63cd5ab0bcfdc515a0462f167630d3bb013daf790ae7d56c6951548c7787894

    SHA512

    c86e001e7ecac58740cce91c6259387b4ce8d16e5a9ca3e1d0f030c4f14bb8231c606cb1762dd0131d5041b76f64232e2204f08a41f3ba0076d8d5b5ccf21c54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3465855.exe

    Filesize

    168KB

    MD5

    e35983e112d9d2004d26be9b9d4b377c

    SHA1

    fb79303a645df9f9dc7ef9b52643064d63ee8520

    SHA256

    24b4edd028f5f74ad7f8414425a12634a6d8d273c2069bfbff4fc300393a26dc

    SHA512

    52e93742e96996a987d2d2eb152a80c19d8500e92541c78ceec12027c9f8db14a82732090ee0122c53198ad920aa29a30864c833a383b90f1ab1688ba20065b3

  • memory/1548-14-0x0000000073DFE000-0x0000000073DFF000-memory.dmp

    Filesize

    4KB

  • memory/1548-15-0x0000000000880000-0x00000000008B0000-memory.dmp

    Filesize

    192KB

  • memory/1548-16-0x00000000012B0000-0x00000000012B6000-memory.dmp

    Filesize

    24KB

  • memory/1548-17-0x000000000AB80000-0x000000000B198000-memory.dmp

    Filesize

    6.1MB

  • memory/1548-18-0x000000000A6F0000-0x000000000A7FA000-memory.dmp

    Filesize

    1.0MB

  • memory/1548-19-0x000000000A620000-0x000000000A632000-memory.dmp

    Filesize

    72KB

  • memory/1548-21-0x000000000A680000-0x000000000A6BC000-memory.dmp

    Filesize

    240KB

  • memory/1548-20-0x0000000073DF0000-0x00000000745A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1548-22-0x0000000004C20000-0x0000000004C6C000-memory.dmp

    Filesize

    304KB

  • memory/1548-23-0x0000000073DFE000-0x0000000073DFF000-memory.dmp

    Filesize

    4KB

  • memory/1548-24-0x0000000073DF0000-0x00000000745A0000-memory.dmp

    Filesize

    7.7MB