Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 02:33

General

  • Target

    ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe

  • Size

    479KB

  • MD5

    ea3869096e4c36e76044fe77068064ef

  • SHA1

    0b6359a24dc32a4684859f0bbb16aaf417d0394b

  • SHA256

    ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160

  • SHA512

    e2d7cbb1073cde966124cd82b48303a50dffd279bf829cb3430f6a3d7bd9c85f6d5efcb328835cd09f6864bb920893cd761fd4f806cb02bf122da6f146800af9

  • SSDEEP

    12288:JMrcy908ErXs4YGK9roGthHZ5HJeOaB0Ek:5yFErX9Yh9om5pJelBxk

Malware Config

Extracted

Family

redline

Botnet

diwer

C2

217.196.96.101:4132

Attributes
  • auth_value

    42abfa9e4f2e290c8bdbc776fd9bb6ad

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe
    "C:\Users\Admin\AppData\Local\Temp\ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6892095.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6892095.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1504054.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1504054.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6892095.exe

    Filesize

    307KB

    MD5

    b9afd3638633c2de4f0aed406e5d5800

    SHA1

    b60898d5652874731935c64490ab26aeeb8c1066

    SHA256

    14d1afa350dbc798dff9696c2f06d4453657b8588a9aa4bd875a4f996414c457

    SHA512

    5b97d359f0cd80bb0d17b18f7d5c50374eb98f303b3313989b6e3cd8c3e97dcab6df55be582abe27ece479425fc2eb7bd798cccdd880b574e21631c8592bd310

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1504054.exe

    Filesize

    168KB

    MD5

    23d32f5946972aa9075f2e1e8ac1aa9d

    SHA1

    e2775c594a9b307e1290f740354aba104ff5333a

    SHA256

    e8440ef3f8fd8af68e87fa67daa55b41b8fc114c83b5bed94dd4dcd3b6254ca2

    SHA512

    aedd4977e11fc6050ef99e4d697dc43a26a0fda100d5e2a8d953cde560a75e9a365f57b81aac68c70db5cf8bca352d71c304c7afb1051ef48e8f6ebb6aa0efad

  • memory/4864-14-0x000000007426E000-0x000000007426F000-memory.dmp

    Filesize

    4KB

  • memory/4864-15-0x00000000005C0000-0x00000000005F0000-memory.dmp

    Filesize

    192KB

  • memory/4864-16-0x0000000002AD0000-0x0000000002AD6000-memory.dmp

    Filesize

    24KB

  • memory/4864-17-0x0000000005670000-0x0000000005C88000-memory.dmp

    Filesize

    6.1MB

  • memory/4864-18-0x0000000005160000-0x000000000526A000-memory.dmp

    Filesize

    1.0MB

  • memory/4864-19-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/4864-20-0x0000000074260000-0x0000000074A10000-memory.dmp

    Filesize

    7.7MB

  • memory/4864-21-0x00000000050E0000-0x000000000511C000-memory.dmp

    Filesize

    240KB

  • memory/4864-22-0x0000000005270000-0x00000000052BC000-memory.dmp

    Filesize

    304KB

  • memory/4864-23-0x000000007426E000-0x000000007426F000-memory.dmp

    Filesize

    4KB

  • memory/4864-24-0x0000000074260000-0x0000000074A10000-memory.dmp

    Filesize

    7.7MB