Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:03

General

  • Target

    8f3e2ab6c8f84c031bf8db2b962ff62258e1f53c332c350f184d180fdb72b7b2.exe

  • Size

    706KB

  • MD5

    9bf8ca978b5882905b63fd85ba5bc843

  • SHA1

    2f7a478586454a29cfc92f4dbbbae06cc6cf4ea0

  • SHA256

    8f3e2ab6c8f84c031bf8db2b962ff62258e1f53c332c350f184d180fdb72b7b2

  • SHA512

    8c5603e1ba293cf35e41cab2cd5e9c5aae9bf2d295c9c5147644268121f5aef27248a7ae222e44718d8314f33c32ca9ab65ce6dfbfac7b7d7dd3c748e8440465

  • SSDEEP

    12288:GMrRy90UiSNjiQlOlSB3REOPq9P6THTb1fcnHdhgpUAB:vy7NrOUsyTCnHyB

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f3e2ab6c8f84c031bf8db2b962ff62258e1f53c332c350f184d180fdb72b7b2.exe
    "C:\Users\Admin\AppData\Local\Temp\8f3e2ab6c8f84c031bf8db2b962ff62258e1f53c332c350f184d180fdb72b7b2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9786980.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9786980.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5139219.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5139219.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9786980.exe

    Filesize

    416KB

    MD5

    90b2d75b513645a08589fdb3a5b916a9

    SHA1

    fd81dad561c3b4cfd6b4bb757afab8e0a94b6d56

    SHA256

    01c9eeb68d6e7cea38dede45e95791653be1e40d129dbf15f9581d8233c5432d

    SHA512

    a0041610d9f506cbf21eebc7204ab22ec7454b2a9892fdae9327546c42464f7767c0860ab38562f5405163040691e687e86ca6d70b016c35c92b6be8fe412e48

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5139219.exe

    Filesize

    136KB

    MD5

    282817d9e651af17c17ccefd44ea0e91

    SHA1

    fa4f506363bfbf03b499bb95bdb4b1138fc163cd

    SHA256

    ba0479c1b9bc1729f371cfd229eac126b135a7427ac5bf884e1267fcacb8e9fc

    SHA512

    09ce188eaca446aaec134297c0f35d18a621e75790650953ab063e119f8dc46a701b1e47985d0f8146983d517d813d50d30c4db78b5122b561f48272b4cb9743

  • memory/408-14-0x0000000073D2E000-0x0000000073D2F000-memory.dmp

    Filesize

    4KB

  • memory/408-15-0x0000000000080000-0x00000000000A8000-memory.dmp

    Filesize

    160KB

  • memory/408-16-0x0000000007490000-0x0000000007AA8000-memory.dmp

    Filesize

    6.1MB

  • memory/408-17-0x0000000006F20000-0x0000000006F32000-memory.dmp

    Filesize

    72KB

  • memory/408-18-0x0000000007050000-0x000000000715A000-memory.dmp

    Filesize

    1.0MB

  • memory/408-19-0x0000000006F80000-0x0000000006FBC000-memory.dmp

    Filesize

    240KB

  • memory/408-20-0x0000000073D20000-0x00000000744D0000-memory.dmp

    Filesize

    7.7MB

  • memory/408-21-0x0000000002470000-0x00000000024BC000-memory.dmp

    Filesize

    304KB

  • memory/408-22-0x0000000073D2E000-0x0000000073D2F000-memory.dmp

    Filesize

    4KB

  • memory/408-23-0x0000000073D20000-0x00000000744D0000-memory.dmp

    Filesize

    7.7MB