Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 17:41

General

  • Target

    e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794.exe

  • Size

    468KB

  • MD5

    336f4a98848166dcc4e11af39eb941dd

  • SHA1

    a091a914dd2cd4a8fa34d08e17f1f74caa444c65

  • SHA256

    e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794

  • SHA512

    7dba766180bf57affa02926a6501cbecca244a0a40f7c680e1915f8584a1a2f931e6728d9867d5be9112f2324868df00f4e3b4cf83c44a2d863394333ca637ce

  • SSDEEP

    12288:sMr4y90NNWyppFgxIFQ4AyNbyRUegLFxE9KT7:8y4AyppCxIC0NbyzgLvE0/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794.exe
    "C:\Users\Admin\AppData\Local\Temp\e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nkt51.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nkt51.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWf98.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWf98.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nkt51.exe

    Filesize

    202KB

    MD5

    0c57858eefc71a71ea075f14aaa0c741

    SHA1

    b592989a033b06bc643563da26b86ade0e686d78

    SHA256

    b61e504d213a933eeaf71de4e72097a373221c8a717bd06fbae405e4a12eb66c

    SHA512

    b051e16309d4a35486f289f3c2ab22bfbc3417c26298efb455ce506fe411fdfe262d47719979d877dd06e55dd88682e1d409d5281dfc98a099e261926a19a8b2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWf98.exe

    Filesize

    175KB

    MD5

    a5f5c5d6291c7ae9e1d1b7ed1e551490

    SHA1

    3d06413341893b838549939e15f8f1eec423d71a

    SHA256

    1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

    SHA512

    d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

  • memory/4876-14-0x00000000747BE000-0x00000000747BF000-memory.dmp

    Filesize

    4KB

  • memory/4876-15-0x0000000000D10000-0x0000000000D42000-memory.dmp

    Filesize

    200KB

  • memory/4876-16-0x0000000005C70000-0x0000000006288000-memory.dmp

    Filesize

    6.1MB

  • memory/4876-17-0x00000000057F0000-0x00000000058FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4876-18-0x0000000005730000-0x0000000005742000-memory.dmp

    Filesize

    72KB

  • memory/4876-19-0x0000000005790000-0x00000000057CC000-memory.dmp

    Filesize

    240KB

  • memory/4876-20-0x0000000005900000-0x000000000594C000-memory.dmp

    Filesize

    304KB

  • memory/4876-21-0x00000000747BE000-0x00000000747BF000-memory.dmp

    Filesize

    4KB