Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 02:33

General

  • Target

    c7a9d6a7c16133914e47c27ef9d02cf409cb6d1ae655eb4538e44e897edb29a2.exe

  • Size

    329KB

  • MD5

    2059d1e6e9b506d419c2823a61430e73

  • SHA1

    dc15fed01ec12a79662a3ed564e8e21e8eafdded

  • SHA256

    c7a9d6a7c16133914e47c27ef9d02cf409cb6d1ae655eb4538e44e897edb29a2

  • SHA512

    3430eb922403f8f873931ebac6ddbebdf6ebb704161dda6a53c9b5be6c8a9a3c60fccea6fbcaba1ad0b314a41420cff539bbf178e033ba0d5fabebb7788b5d41

  • SSDEEP

    6144:eUgLpjp90jrpL6sz42bqrJiZXU+lpEoZ2v3pCLT0mY0:eUg91qjrlJzCUZXU+7E3v5CLTJP

Malware Config

Extracted

Family

redline

Botnet

123

C2

78.153.144.3:2510

Attributes
  • auth_value

    cd6abb0af211bce081d7bf127cc26835

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7a9d6a7c16133914e47c27ef9d02cf409cb6d1ae655eb4538e44e897edb29a2.exe
    "C:\Users\Admin\AppData\Local\Temp\c7a9d6a7c16133914e47c27ef9d02cf409cb6d1ae655eb4538e44e897edb29a2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1128-1-0x0000000000720000-0x0000000000820000-memory.dmp

    Filesize

    1024KB

  • memory/1128-2-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1128-3-0x0000000000400000-0x00000000005A8000-memory.dmp

    Filesize

    1.7MB

  • memory/1128-4-0x0000000002240000-0x000000000227E000-memory.dmp

    Filesize

    248KB

  • memory/1128-5-0x0000000002280000-0x00000000022BC000-memory.dmp

    Filesize

    240KB

  • memory/1128-6-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-7-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-9-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-17-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-35-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-61-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-57-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-69-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-67-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-65-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-63-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-59-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-55-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-53-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-51-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-49-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-47-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-45-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-43-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-41-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-39-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-37-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-33-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-31-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-29-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-27-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-25-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-23-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-21-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-19-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-15-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-13-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-11-0x0000000002280000-0x00000000022B6000-memory.dmp

    Filesize

    216KB

  • memory/1128-1234-0x0000000000720000-0x0000000000820000-memory.dmp

    Filesize

    1024KB