Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 01:19

General

  • Target

    8bda8c22b0a95e08b1c1543ed07949ca3ff6e402194e42a382b7d447c8390e42.exe

  • Size

    423KB

  • MD5

    0362f086d919e0c4efc5dc6cb60a2054

  • SHA1

    d2501376b1ea01ded784f4833507faa1a847c80a

  • SHA256

    8bda8c22b0a95e08b1c1543ed07949ca3ff6e402194e42a382b7d447c8390e42

  • SHA512

    67ea79954cb778ccc1f213b86d83e4281552d21b6eca23c8e03ff7a5e941c21771b91ec77d1abb2532078d49849c80515c4b73bf165c3e0187913733e470ff68

  • SSDEEP

    6144:cMui5ObVmy+0LExccD4HOCL+qzPI1vCyuKkYi82Jzj6efYPV0p:GrLExjiOCyqzPI1vCyuKkBJzjL

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.9.20.59:46287

Attributes
  • auth_value

    ec6ada170bcec2e72f0e1f3954547f73

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bda8c22b0a95e08b1c1543ed07949ca3ff6e402194e42a382b7d447c8390e42.exe
    "C:\Users\Admin\AppData\Local\Temp\8bda8c22b0a95e08b1c1543ed07949ca3ff6e402194e42a382b7d447c8390e42.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1344-1-0x00000000005C0000-0x00000000006C0000-memory.dmp

    Filesize

    1024KB

  • memory/1344-2-0x0000000000220000-0x0000000000259000-memory.dmp

    Filesize

    228KB

  • memory/1344-3-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1344-4-0x0000000000400000-0x00000000004EB000-memory.dmp

    Filesize

    940KB

  • memory/1344-5-0x0000000000590000-0x00000000005C4000-memory.dmp

    Filesize

    208KB

  • memory/1344-6-0x0000000000760000-0x0000000000792000-memory.dmp

    Filesize

    200KB

  • memory/1344-7-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-30-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-42-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-70-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-68-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-66-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-64-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-62-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-60-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-58-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-56-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-54-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-52-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-50-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-48-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-46-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-44-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-40-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-38-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-36-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-34-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-32-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-28-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-26-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-24-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-23-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-20-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-18-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-16-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-14-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-12-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-10-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-8-0x0000000000760000-0x000000000078C000-memory.dmp

    Filesize

    176KB

  • memory/1344-957-0x00000000005C0000-0x00000000006C0000-memory.dmp

    Filesize

    1024KB

  • memory/1344-958-0x0000000000220000-0x0000000000259000-memory.dmp

    Filesize

    228KB

  • memory/1344-960-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB