Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:47

General

  • Target

    b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394.exe

  • Size

    567KB

  • MD5

    ec9c6a609db680d2457b503a10d8b054

  • SHA1

    68367d40d31cea67309fbb33ae6ff43ad484a9c5

  • SHA256

    b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394

  • SHA512

    b4bfd3439c8605a06c9798c01d6b3e4f3ec24a7834d938eb60aa9cb1c0733504de783e4754e7a621d034e6af262f90cdcf9f82c937f124cf9438dab8fb5c739f

  • SSDEEP

    12288:CMrHy90WhG0F1eaVyCcUuUck0CAyll0VeWTwFh6+v:tym0XWVUHcM0TwP6+v

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394.exe
    "C:\Users\Admin\AppData\Local\Temp\b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7241442.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7241442.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6491691.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6491691.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7241442.exe

    Filesize

    395KB

    MD5

    ee8993937a95e7823dcd78a493ce0a77

    SHA1

    49c3f3e0afa043071fa9e97f8e8f2909aeb5bde8

    SHA256

    1601f37fc9f48cf4511faa0f7b8fd0ffc79086b9966aea870649c861db13cf51

    SHA512

    050315aefab5c60c7a5404619975bdd3a1b9713cbfbee466f11973d6585019c609c9dc3ae9e077315fc1483364e1c8bc9bd063ea4df1d5c38da5da075f5077aa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6491691.exe

    Filesize

    168KB

    MD5

    f6ac50d425254fe2ff611c9f6cc72a6b

    SHA1

    eb3f09d17a1d44f4cdcecf9e4e437b4a4756eb2f

    SHA256

    9d0fb663e7a10f37429786ef7d643cb398580130a8b96f7b57288e021b5fc114

    SHA512

    4cd1adea37a8e77f96e198e6d76afc47221796a233929097e114e351040e1912c7e76505e7fccdec70cbe2bf8b5dce9b4e5f4df6c58c6c8b03c39a955f37f7c7

  • memory/4344-14-0x000000007405E000-0x000000007405F000-memory.dmp

    Filesize

    4KB

  • memory/4344-15-0x0000000000570000-0x000000000059E000-memory.dmp

    Filesize

    184KB

  • memory/4344-16-0x00000000029A0000-0x00000000029A6000-memory.dmp

    Filesize

    24KB

  • memory/4344-17-0x00000000056F0000-0x0000000005D08000-memory.dmp

    Filesize

    6.1MB

  • memory/4344-18-0x00000000051E0000-0x00000000052EA000-memory.dmp

    Filesize

    1.0MB

  • memory/4344-19-0x0000000004F20000-0x0000000004F32000-memory.dmp

    Filesize

    72KB

  • memory/4344-21-0x0000000074050000-0x0000000074800000-memory.dmp

    Filesize

    7.7MB

  • memory/4344-20-0x0000000004F80000-0x0000000004FBC000-memory.dmp

    Filesize

    240KB

  • memory/4344-22-0x00000000050E0000-0x000000000512C000-memory.dmp

    Filesize

    304KB

  • memory/4344-23-0x000000007405E000-0x000000007405F000-memory.dmp

    Filesize

    4KB

  • memory/4344-24-0x0000000074050000-0x0000000074800000-memory.dmp

    Filesize

    7.7MB