Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 15:07

General

  • Target

    9c1ec009cdeabd13c8969eb3380a60c30bfdcb6ff2adbc4658be029dcd8a14ab.exe

  • Size

    566KB

  • MD5

    5373270bca4bfb2f9c849d4f6669fd01

  • SHA1

    206a43023c0b6dad06a68cd51494f000202fd1e2

  • SHA256

    9c1ec009cdeabd13c8969eb3380a60c30bfdcb6ff2adbc4658be029dcd8a14ab

  • SHA512

    58c7aa88adf6b2d9dd98eb3d427fdfe015f62516c1486b2c17f1779b8c52ce763925d5e55032ebedd48483c703b94204692be1063237db5c0a23e8fdd5d3de82

  • SSDEEP

    12288:VMrty90uQXWPUs8Xi7K4EokSpJAgRw70A9EhIaY1e/Z3:QyH2q+4EokSIgRw70AKhV3

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c1ec009cdeabd13c8969eb3380a60c30bfdcb6ff2adbc4658be029dcd8a14ab.exe
    "C:\Users\Admin\AppData\Local\Temp\9c1ec009cdeabd13c8969eb3380a60c30bfdcb6ff2adbc4658be029dcd8a14ab.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8327712.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8327712.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2755155.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2755155.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8327712.exe

    Filesize

    307KB

    MD5

    058d22ab71b310dcdc869bf6718a9395

    SHA1

    97dd99e4701633c61a37d37440028866666984e4

    SHA256

    2c724edc259392cac324417911230ef53b3cac6516622a0fd09b94f71c4c2f82

    SHA512

    869d2f64b7223f752bb02b24ab4bef331d92ea9456d8f734172f4f5d32b83661e9325d37c6cb7b2ed48342a166ed6410f0065a02aee0b3a39b4d6aadd91f93e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2755155.exe

    Filesize

    169KB

    MD5

    05066cd27a0d6eb938e5eb3894d2ecdd

    SHA1

    0b2e4578127be1ee655d55f729e0ae763ab125f8

    SHA256

    44239c7f8a46eda2791dec9bd8cf6fa2cd113533a480c38c3df033a3501f46ea

    SHA512

    cbb33e984e15e422f76a248695ebdddb2937e6e00c9f375e1c6904d1003a91513d5982df4254d9433a88234c4b82dc46863f5d0f60c84245ac4363970738ff89

  • memory/464-14-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB

  • memory/464-15-0x00000000001D0000-0x0000000000200000-memory.dmp

    Filesize

    192KB

  • memory/464-16-0x0000000002470000-0x0000000002476000-memory.dmp

    Filesize

    24KB

  • memory/464-17-0x00000000052D0000-0x00000000058E8000-memory.dmp

    Filesize

    6.1MB

  • memory/464-18-0x0000000004DC0000-0x0000000004ECA000-memory.dmp

    Filesize

    1.0MB

  • memory/464-19-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/464-20-0x0000000004CF0000-0x0000000004D2C000-memory.dmp

    Filesize

    240KB

  • memory/464-21-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB

  • memory/464-22-0x0000000004D40000-0x0000000004D8C000-memory.dmp

    Filesize

    304KB

  • memory/464-23-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB

  • memory/464-24-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB