Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:32

General

  • Target

    ff05c1d5bdb131285b994709778f6044f20a95a840a1686de06b1f8f169ff537.exe

  • Size

    566KB

  • MD5

    4a2b686b7c0ed54f2576912a2abe0d3f

  • SHA1

    e7cfdb2c9f3a9a165dd45664cf8566b9d4c35b33

  • SHA256

    ff05c1d5bdb131285b994709778f6044f20a95a840a1686de06b1f8f169ff537

  • SHA512

    0566a223106f99e3aa4e17036b12b67c4ac975b0daf559dafabe1d0bd8ac31fee9dd5c19ebbbde5bfb11c892c8072f0aa53810eb2d3b93a948311c049be13e3e

  • SSDEEP

    12288:qMrBy90ufZ+ClYmtVqQNsrRTC0qGTdxpxhNGSdEg:LyF/lYmzxsrRTtqGhxpxzG0

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff05c1d5bdb131285b994709778f6044f20a95a840a1686de06b1f8f169ff537.exe
    "C:\Users\Admin\AppData\Local\Temp\ff05c1d5bdb131285b994709778f6044f20a95a840a1686de06b1f8f169ff537.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5913565.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5913565.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1333055.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1333055.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5913565.exe

    Filesize

    307KB

    MD5

    15d18f08f7b9b851ed5ce64e62c180e6

    SHA1

    1e6f86f4b9b9de3b75bca73aced091e5a3d03dec

    SHA256

    77b516e9faaa0769767e4fab80768efe72b8f2b19f300b08b85f0eedeb5d533a

    SHA512

    b7aca55452e37b7cb6751a9c8882887ac9b0f1cbf0666d3dc88bce3e552d51e2afa3b5fd094fcabf777b9ca919efbd40d2ca12694aeb0add4592eb8df8c44a02

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1333055.exe

    Filesize

    168KB

    MD5

    13ecbd55b424fc70fe0a732f855d2a42

    SHA1

    7fb01a914d9f3a967c9aa9b65f89ed2a2fef09c4

    SHA256

    4535faa6b95b14ac95c02e5de1ea9f699fcaad46024d788514b6aa110c12ee12

    SHA512

    8738f6083cfb91e2bdffe34cf2510f9adabe3458531bf211d4ab2fed505c77fbce7ee34e14148cf3adaa908b57cf2d14be875c66faf20d462bf2ce070b5130b1

  • memory/4436-14-0x0000000073F0E000-0x0000000073F0F000-memory.dmp

    Filesize

    4KB

  • memory/4436-15-0x0000000000550000-0x0000000000580000-memory.dmp

    Filesize

    192KB

  • memory/4436-16-0x00000000028F0000-0x00000000028F6000-memory.dmp

    Filesize

    24KB

  • memory/4436-17-0x0000000005470000-0x0000000005A88000-memory.dmp

    Filesize

    6.1MB

  • memory/4436-18-0x0000000004FA0000-0x00000000050AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4436-19-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

    Filesize

    72KB

  • memory/4436-20-0x0000000004F30000-0x0000000004F6C000-memory.dmp

    Filesize

    240KB

  • memory/4436-21-0x0000000073F00000-0x00000000746B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4436-22-0x00000000050B0000-0x00000000050FC000-memory.dmp

    Filesize

    304KB

  • memory/4436-23-0x0000000073F0E000-0x0000000073F0F000-memory.dmp

    Filesize

    4KB

  • memory/4436-24-0x0000000073F00000-0x00000000746B0000-memory.dmp

    Filesize

    7.7MB