Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:14

General

  • Target

    935f9a9cbf04c70fe250b9726543cbed80d0f5dde4e16beab2d176e65d92a1a7.exe

  • Size

    478KB

  • MD5

    1ab7d6eebc42bef8d9479ef71193b52c

  • SHA1

    10a2cc931a922b102dff82af7ea6a66623d9b339

  • SHA256

    935f9a9cbf04c70fe250b9726543cbed80d0f5dde4e16beab2d176e65d92a1a7

  • SHA512

    da930b8e5ef60f6545e893cec3ba605d96c2623333153a60a9cf5554898aac9735b21cf633830f4321c31d716d5501cae303d49440896c1f209a368df8c3c0d6

  • SSDEEP

    12288:LMrFy90eGMAH6V8WehVVRGZsCKNHespCk:GyOMJVYBpxN+CCk

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\935f9a9cbf04c70fe250b9726543cbed80d0f5dde4e16beab2d176e65d92a1a7.exe
    "C:\Users\Admin\AppData\Local\Temp\935f9a9cbf04c70fe250b9726543cbed80d0f5dde4e16beab2d176e65d92a1a7.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nkX76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nkX76.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQi42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQi42.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nkX76.exe

    Filesize

    202KB

    MD5

    d12163d2ce028bfae5bba271f89c0b53

    SHA1

    fe99de61be078d68ed335c00ca534ec0f0336d62

    SHA256

    d30ba5690dd526a98b624ec5c5147c2e688969843b365dbc011a7a13513f7ed5

    SHA512

    c1cc05736efe65fb5b8bcb40e73608ff293dde7fe7051d1c56efd5d9b1114a4082eaecac48fde45035ec7389b0676af388a3b1d4843b656683eb37aa6a3aa9cc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQi42.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • memory/3036-14-0x000000007479E000-0x000000007479F000-memory.dmp

    Filesize

    4KB

  • memory/3036-15-0x0000000000330000-0x0000000000362000-memory.dmp

    Filesize

    200KB

  • memory/3036-16-0x0000000005150000-0x0000000005768000-memory.dmp

    Filesize

    6.1MB

  • memory/3036-17-0x0000000004CD0000-0x0000000004DDA000-memory.dmp

    Filesize

    1.0MB

  • memory/3036-18-0x0000000004C00000-0x0000000004C12000-memory.dmp

    Filesize

    72KB

  • memory/3036-19-0x0000000004C60000-0x0000000004C9C000-memory.dmp

    Filesize

    240KB

  • memory/3036-20-0x0000000004DE0000-0x0000000004E2C000-memory.dmp

    Filesize

    304KB

  • memory/3036-21-0x000000007479E000-0x000000007479F000-memory.dmp

    Filesize

    4KB