Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 20:21

General

  • Target

    62b2ab0c6b4078069b5d2e7f686da0422f93c11de46c58d8880b89fd0082d95c.exe

  • Size

    411KB

  • MD5

    1526108405df1450816547380186b60c

  • SHA1

    4f1299df9e574f8bca637e57037aeee5d71a1db5

  • SHA256

    62b2ab0c6b4078069b5d2e7f686da0422f93c11de46c58d8880b89fd0082d95c

  • SHA512

    6d8f5861863871c2f9827eba5413fe12f88f9e1a69ba2eefb6530b1c2a20d794c5f31ef669b758a128e2701ed28e6bd1cce16d863c84fd4daf067c87cf7507e3

  • SSDEEP

    6144:WKwDQ4UXE73s4FCu8zli0+mXjA4cz5hb/HH5uixRoKwCrWXZu:3aQ4UXE73slPw4cz5N/HkeRoE/

Malware Config

Extracted

Family

redline

Botnet

11

C2

45.9.20.157:46257

Attributes
  • auth_value

    344c26d7f808f9c29e47633026f19aa5

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62b2ab0c6b4078069b5d2e7f686da0422f93c11de46c58d8880b89fd0082d95c.exe
    "C:\Users\Admin\AppData\Local\Temp\62b2ab0c6b4078069b5d2e7f686da0422f93c11de46c58d8880b89fd0082d95c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2616-1-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB

  • memory/2616-3-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2616-2-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2616-4-0x0000000002060000-0x0000000002094000-memory.dmp

    Filesize

    208KB

  • memory/2616-5-0x00000000021A0000-0x00000000021D2000-memory.dmp

    Filesize

    200KB

  • memory/2616-7-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-6-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-9-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-15-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-35-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-33-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-41-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-51-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-57-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-69-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-67-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-65-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-59-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-55-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-53-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-49-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-47-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-45-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-43-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-39-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-37-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-31-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-29-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-27-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-25-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-23-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-21-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-19-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-63-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-17-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-61-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-13-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-11-0x00000000021A0000-0x00000000021CD000-memory.dmp

    Filesize

    180KB

  • memory/2616-952-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB

  • memory/2616-953-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB