Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 15:01

General

  • Target

    b85e65232426a7f4dd4cd2d574286ef9c7850ab2b40c34aae15a05505c31d753.exe

  • Size

    643KB

  • MD5

    a22476df0ddd29d2a6c7218a3777d0d5

  • SHA1

    88a801cc3eea71927fda4738febe0bcc22b8e340

  • SHA256

    b85e65232426a7f4dd4cd2d574286ef9c7850ab2b40c34aae15a05505c31d753

  • SHA512

    e2c3b19cf0220397d57aac88e216c1f274c60ee9b514ab62cae609234806ced06eb39a097df5901dbd3394276d79cc5d4729f47ecd8f7d3397b7a7b0a1334da4

  • SSDEEP

    12288:yMrFy90FdUnfDthmTHYgoUJwCbjvR8nBUzfa/T+dsXTDgzFg4fdrlX:/yLKYrOwCvZ8dLlvgxg41rV

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b85e65232426a7f4dd4cd2d574286ef9c7850ab2b40c34aae15a05505c31d753.exe
    "C:\Users\Admin\AppData\Local\Temp\b85e65232426a7f4dd4cd2d574286ef9c7850ab2b40c34aae15a05505c31d753.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2695560.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2695560.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9850387.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9850387.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2695560.exe

    Filesize

    383KB

    MD5

    dc7a6e9ab28dcdbf662cde782142ae40

    SHA1

    8370856c0a14d26d1b230e37c5e737442802d4b8

    SHA256

    0b2d095334fdbb8532fed988d8d15c3cf7d0ebdb34a975df2d3ae77ec8f9dce6

    SHA512

    da4e9f66f1df759e9f32564bef5e6291c071c663c45beef30ed26da912b370cc59f96a1feb583751cf0d942c7f69cb7df7949b929dd54106cb23bda4e0a8789a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9850387.exe

    Filesize

    168KB

    MD5

    a729362e72a1538e1e37b037aba330ae

    SHA1

    745bcf1eff43e4f1db37451117aed32fe10f8486

    SHA256

    0781a2aa16a03de75d75482c8e6ec54b47fe902fd3435447d0dbbe8e6b6e3875

    SHA512

    870aa6db32c18100c8bfbd6d3dbefe61561b2263ba462cd0b89bcb9fb7c53d933a8291ea5c56507c3310080c61d6d84b4ac38feba51968c72315f3eee254e26f

  • memory/2556-14-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/2556-15-0x0000000000170000-0x00000000001A0000-memory.dmp

    Filesize

    192KB

  • memory/2556-16-0x0000000002600000-0x0000000002606000-memory.dmp

    Filesize

    24KB

  • memory/2556-17-0x00000000051D0000-0x00000000057E8000-memory.dmp

    Filesize

    6.1MB

  • memory/2556-18-0x0000000004CC0000-0x0000000004DCA000-memory.dmp

    Filesize

    1.0MB

  • memory/2556-19-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/2556-20-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/2556-21-0x0000000004A40000-0x0000000004A7C000-memory.dmp

    Filesize

    240KB

  • memory/2556-22-0x0000000004BB0000-0x0000000004BFC000-memory.dmp

    Filesize

    304KB

  • memory/2556-23-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/2556-24-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB