Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:15

General

  • Target

    ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe

  • Size

    765KB

  • MD5

    6e866baf65433fe9ccaa8ad78a4f8e16

  • SHA1

    19fbb2ac8bc0a585bf251143aac5f6970bace3e7

  • SHA256

    ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6

  • SHA512

    8322bad6738b2c0ab67daace81ce10808fe0fa6a46d012ff218879e1096ef9c894b2fcf4a6ebafa4756f151d7863e315235fd62a26e53d81a391f0836bbdc093

  • SSDEEP

    12288:iMrNy90TgfuKiKMdW6srhPFAOzxlLZtwbGpuD8QJwcyN2Ee2c:HyYgfuKi+hFAOfLZtwbGwDLwcfBt

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe
    "C:\Users\Admin\AppData\Local\Temp\ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vVE40.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vVE40.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vIR13.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vIR13.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRM32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRM32.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vVE40.exe

    Filesize

    661KB

    MD5

    b60ab8f0a5c954513885964f10cfdec7

    SHA1

    b37f84b0cf8c2d8d4e540672d1314eaff84cfed0

    SHA256

    ad0428a60dc825aca122aeceb02060f2513ad0072f038899e1a338d279eacbff

    SHA512

    2258268254f3c3b878ac3fd58c8146c035c015c12725faef210e9014121aaf44333fd53465caadc87065cfdfbb9bcbc31751a499532461eb4d01f2588afbba37

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vIR13.exe

    Filesize

    516KB

    MD5

    1c503bf64e46dabb31703ad8a5b37257

    SHA1

    ce7e55597b514830f9e1ecde2e3fb59a86847876

    SHA256

    41fe0562da6fa16946708250430bc18e36ba21381903462526b9b034a63d8438

    SHA512

    d549c23de60c0e39915dd1e49cd6274d96028df310f5c771ac759974d1adc8ab43f7da44b057563767dbc05739b98f8aea4edefdcc601693d13feb194f2c15d0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRM32.exe

    Filesize

    296KB

    MD5

    1fac68ff822048c7d438408c40af955b

    SHA1

    8f6728720ee05f7972d7a5e99b3a71703e0e7db7

    SHA256

    59175875cc49dbb1ebfd537ce345fd24462a5befdbbc81983acd164842966214

    SHA512

    631887b4a57c30e7c25bf587f335b01cd3b12a9ba63cacc4f96fe313e93ee7039ece1d390a12d6ce62ee7f598b7c98a7debe72d686bcdbb53628d21f6d8d1dcc

  • memory/2964-22-0x0000000002920000-0x0000000002966000-memory.dmp

    Filesize

    280KB

  • memory/2964-23-0x0000000004F90000-0x0000000005534000-memory.dmp

    Filesize

    5.6MB

  • memory/2964-24-0x0000000004DF0000-0x0000000004E34000-memory.dmp

    Filesize

    272KB

  • memory/2964-36-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-48-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-86-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-84-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-82-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-80-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-78-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-76-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-74-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-72-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-68-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-66-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-64-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-62-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-60-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-58-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-56-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-54-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-52-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-46-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-44-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-42-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-40-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-38-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-32-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-30-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-88-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-28-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-70-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-26-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-50-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-25-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-34-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2964-931-0x0000000005540000-0x0000000005B58000-memory.dmp

    Filesize

    6.1MB

  • memory/2964-932-0x0000000005B60000-0x0000000005C6A000-memory.dmp

    Filesize

    1.0MB

  • memory/2964-933-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

    Filesize

    72KB

  • memory/2964-934-0x0000000004F20000-0x0000000004F5C000-memory.dmp

    Filesize

    240KB

  • memory/2964-935-0x0000000005D70000-0x0000000005DBC000-memory.dmp

    Filesize

    304KB