Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:41

General

  • Target

    54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665.exe

  • Size

    479KB

  • MD5

    c3bce2e6d41ad7d30349d7a45485bf08

  • SHA1

    e11be83a476615318fbcfe56344776b5db0526d9

  • SHA256

    54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665

  • SHA512

    07b75fc002ff93b4c002d68fc07889036d16ddb265c598c6cf829d53220f7a34761e6b604acbc92df9ca761460dd8729247208093a68311cf1fa188ac2f7ebd3

  • SSDEEP

    6144:KIy+bnr+Mp0yN90QEQOZD9QyjJtf/NMsGQAxGA4SgYGzIUnirnB+qBly8m3256GC:oMr4y90fD9N/nwGDx4rnZHYILR2sYD

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665.exe
    "C:\Users\Admin\AppData\Local\Temp\54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4263331.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4263331.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0142599.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0142599.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4263331.exe

    Filesize

    308KB

    MD5

    787903d2aab791f81d4c8c852c2fbe2c

    SHA1

    bb2f11ecea46d7757e4607f26af473b926a3f726

    SHA256

    42953c1e0bc381cccf38f6e23ac9ee3910c93c2b8b323f637b34cb387a613686

    SHA512

    c40ee2aea7a7b2a54be0e5641911ecf5e4a8a4be0df9f922749b75749727273be76bfbce36244ad093d916b4efbbfae41a69d3b0e886f67ef230f2b28d02cd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0142599.exe

    Filesize

    168KB

    MD5

    3ca5fb1e9bba58e0437a496e8fe2058b

    SHA1

    46c4101fdd0f90e7e33c9e20571bca9f6e455920

    SHA256

    5efdce714842a7777ff40d6bff4c198109b5b9f21c616fa612ad93c141d37093

    SHA512

    6f6491dc5b4d43807b8ffabfe90ac6fd9cbfc15e398dbf2b35e7ac1bd99072e0a4f5402332dac4eb04964dd9e601c4bcf0c9fa878276d09b7ecfc7177c896a5e

  • memory/3216-14-0x000000007475E000-0x000000007475F000-memory.dmp

    Filesize

    4KB

  • memory/3216-15-0x0000000000A20000-0x0000000000A4E000-memory.dmp

    Filesize

    184KB

  • memory/3216-16-0x0000000002C10000-0x0000000002C16000-memory.dmp

    Filesize

    24KB

  • memory/3216-17-0x000000000ADC0000-0x000000000B3D8000-memory.dmp

    Filesize

    6.1MB

  • memory/3216-18-0x000000000A8B0000-0x000000000A9BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3216-19-0x000000000A7C0000-0x000000000A7D2000-memory.dmp

    Filesize

    72KB

  • memory/3216-20-0x000000000A820000-0x000000000A85C000-memory.dmp

    Filesize

    240KB

  • memory/3216-21-0x0000000074750000-0x0000000074F00000-memory.dmp

    Filesize

    7.7MB

  • memory/3216-22-0x0000000004D60000-0x0000000004DAC000-memory.dmp

    Filesize

    304KB

  • memory/3216-23-0x000000007475E000-0x000000007475F000-memory.dmp

    Filesize

    4KB

  • memory/3216-24-0x0000000074750000-0x0000000074F00000-memory.dmp

    Filesize

    7.7MB