Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:05

General

  • Target

    a58e1ca08662224133a588340c92977a0c8e449287fc66ee24c962cbfadcd2ed.exe

  • Size

    2.3MB

  • MD5

    471cd843cafd0c683fcf443938ea57fc

  • SHA1

    7c0dd2817b7e9fcadea4f50fbf55027fe02b9dbf

  • SHA256

    a58e1ca08662224133a588340c92977a0c8e449287fc66ee24c962cbfadcd2ed

  • SHA512

    8eb74441904e8f260d95690684e1f82ace12c173a044a3ee12b1e4e0e0822b817ae11f7b19f991e4fdc97a3d592abea3de4e3aaff92bbaf1630a20161f88347f

  • SSDEEP

    24576:0AN0mRQJEjZr7E/TO/oxm0lTsQ6dabP6Xxf8ZgOfBdSHuQ5p3h3T3:0AN0mRQJEjZr7c+jC5bP6XB8ZgGU

Malware Config

Extracted

Family

redline

Botnet

inst bot usa

C2

185.215.113.74:21098

Attributes
  • auth_value

    899dc7b7d3f657473afed493a701bbbc

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a58e1ca08662224133a588340c92977a0c8e449287fc66ee24c962cbfadcd2ed.exe
    "C:\Users\Admin\AppData\Local\Temp\a58e1ca08662224133a588340c92977a0c8e449287fc66ee24c962cbfadcd2ed.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:39436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 36292
      2⤵
      • Program crash
      PID:39576
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3272 -ip 3272
    1⤵
      PID:39504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3272-0-0x00000000004D2000-0x00000000004D3000-memory.dmp

      Filesize

      4KB

    • memory/3272-13-0x0000000000400000-0x0000000000543000-memory.dmp

      Filesize

      1.3MB

    • memory/39436-1-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/39436-6-0x000000007450E000-0x000000007450F000-memory.dmp

      Filesize

      4KB

    • memory/39436-7-0x0000000005B50000-0x0000000006168000-memory.dmp

      Filesize

      6.1MB

    • memory/39436-8-0x0000000005560000-0x0000000005572000-memory.dmp

      Filesize

      72KB

    • memory/39436-9-0x0000000005690000-0x000000000579A000-memory.dmp

      Filesize

      1.0MB

    • memory/39436-10-0x00000000055C0000-0x00000000055FC000-memory.dmp

      Filesize

      240KB

    • memory/39436-11-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/39436-12-0x0000000005600000-0x000000000564C000-memory.dmp

      Filesize

      304KB

    • memory/39436-14-0x000000007450E000-0x000000007450F000-memory.dmp

      Filesize

      4KB

    • memory/39436-15-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB