Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 02:37

General

  • Target

    26149037deefec53ab26055d5f98b7d8c278665d67182f71f4c759aa0bb23fd1.exe

  • Size

    479KB

  • MD5

    b1f25bf1737db816f55e6efddaef03cb

  • SHA1

    88b2c5e753926e156bea7c3b3a776847771222db

  • SHA256

    26149037deefec53ab26055d5f98b7d8c278665d67182f71f4c759aa0bb23fd1

  • SHA512

    b60a88ab1b827f805da3a8d887faf456a4c4d34d8476432ba5a69bde3558a9f7035fdaf33ab019935c875ab864759e45e83158b47754d43b728c02d42c988fef

  • SSDEEP

    6144:Key+bnr+ip0yN90QEbnN96Q9iWbwdTmt/z1OKItlbL++iWK0xeTLZAsbb8gver9I:iMrGy90tnNwAbxhgHtlVZ+bOZVv4N

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26149037deefec53ab26055d5f98b7d8c278665d67182f71f4c759aa0bb23fd1.exe
    "C:\Users\Admin\AppData\Local\Temp\26149037deefec53ab26055d5f98b7d8c278665d67182f71f4c759aa0bb23fd1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2562850.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2562850.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1832157.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1832157.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2562850.exe

    Filesize

    307KB

    MD5

    bce920cd6fbaaa5ddb0098377345e158

    SHA1

    a799f3a851d1e2fe999c6caa7eb1ab171459be5d

    SHA256

    9bcd737ba003daa5889d4eb45b098d6ac861d810e45e2e8a0092ddbcced4b3cb

    SHA512

    e8a9ffbf30e55f76a4eecc7c2f608ce1aa05d2c76f88027e3e3b6634f7815500076b71c4895f482e46fc1ce72a4d33e771c2c529a3bd0f6ceb0bc84f98586acf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1832157.exe

    Filesize

    168KB

    MD5

    b1761134d57ba775a6e2db77d58d4dd9

    SHA1

    a8387bbe03e8013ec4c4b9be29d19e135f23526d

    SHA256

    13d20731db3bbfb9553e2329202c34dec1fed7f75c646a2e5272bfe46f2c66bc

    SHA512

    4a864fdcf2fa161eee8d29d28f87c3ed2d0760e365985539c363b5dba9ae7a67d52b19756bf94c627df83078276735dba51a39b7a2b2724b71459393ed4e6a0b

  • memory/2424-14-0x0000000073F6E000-0x0000000073F6F000-memory.dmp

    Filesize

    4KB

  • memory/2424-15-0x0000000000B70000-0x0000000000B9E000-memory.dmp

    Filesize

    184KB

  • memory/2424-16-0x0000000002F80000-0x0000000002F86000-memory.dmp

    Filesize

    24KB

  • memory/2424-17-0x0000000005C30000-0x0000000006248000-memory.dmp

    Filesize

    6.1MB

  • memory/2424-18-0x0000000005720000-0x000000000582A000-memory.dmp

    Filesize

    1.0MB

  • memory/2424-19-0x0000000005630000-0x0000000005642000-memory.dmp

    Filesize

    72KB

  • memory/2424-20-0x0000000073F60000-0x0000000074710000-memory.dmp

    Filesize

    7.7MB

  • memory/2424-21-0x0000000005690000-0x00000000056CC000-memory.dmp

    Filesize

    240KB

  • memory/2424-22-0x0000000005830000-0x000000000587C000-memory.dmp

    Filesize

    304KB

  • memory/2424-23-0x0000000073F6E000-0x0000000073F6F000-memory.dmp

    Filesize

    4KB

  • memory/2424-24-0x0000000073F60000-0x0000000074710000-memory.dmp

    Filesize

    7.7MB