Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:25

General

  • Target

    2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601.exe

  • Size

    479KB

  • MD5

    757a89485c77c237e0d3f7c469550d05

  • SHA1

    460538392ef2dfd6732efae67f861d42b902cde0

  • SHA256

    2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601

  • SHA512

    f61b30e0d06dce0fa637e681d3bcc01dada88a3d430109039d57121746039f9ee7275fdd340220958952563dd56e8cd8804069dece1d007d46f6cb2d8d8e8946

  • SSDEEP

    6144:Kby+bnr+2p0yN90QEBFQL+1xOPQX8g01tj4Q4GJc9S2ZiT9xDMCALHbUSGrqeINJ:NMr6y90XFQlp1tcQ4D6TwzLA5rq3NQm

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601.exe
    "C:\Users\Admin\AppData\Local\Temp\2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5391670.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5391670.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6424464.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6424464.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5391670.exe

    Filesize

    307KB

    MD5

    12591729e916363c26bf36875cc544d0

    SHA1

    01ec01f713ebf083d7dc4b144e20df60f62ae6de

    SHA256

    25c7ce466032292d9d10aa9038a915d70984b8f43254a1474713bde357e5b747

    SHA512

    d4591c1768e62b57b23cbec651c01c7b71b85d4d1ef96068cda9f32d026e8f145e0b43292579228e43f879811f8ad76b32b8348312e947e713ac0bb3c34519c0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6424464.exe

    Filesize

    168KB

    MD5

    16463e4de6854b09c45b23690a77cb46

    SHA1

    d406974884a23c9058e9c210027255661083cf03

    SHA256

    71a6c129e2ccebdc64a57b8c2e46d580433888efb0da6d70cc1f75fa95dc33c5

    SHA512

    712a775e6ddfb0bd3176824ef6520b4fec1fad16fee9258bf8508fac983c3cee90dc75d3527b10d966117d142b89b94230d82b89554f397fbd02228f1fe86350

  • memory/3476-14-0x0000000074BBE000-0x0000000074BBF000-memory.dmp

    Filesize

    4KB

  • memory/3476-15-0x0000000000A60000-0x0000000000A8E000-memory.dmp

    Filesize

    184KB

  • memory/3476-16-0x0000000002D30000-0x0000000002D36000-memory.dmp

    Filesize

    24KB

  • memory/3476-17-0x0000000005A80000-0x0000000006098000-memory.dmp

    Filesize

    6.1MB

  • memory/3476-18-0x0000000005570000-0x000000000567A000-memory.dmp

    Filesize

    1.0MB

  • memory/3476-19-0x00000000053D0000-0x00000000053E2000-memory.dmp

    Filesize

    72KB

  • memory/3476-20-0x0000000005460000-0x000000000549C000-memory.dmp

    Filesize

    240KB

  • memory/3476-21-0x0000000074BB0000-0x0000000075360000-memory.dmp

    Filesize

    7.7MB

  • memory/3476-22-0x00000000054A0000-0x00000000054EC000-memory.dmp

    Filesize

    304KB

  • memory/3476-23-0x0000000074BBE000-0x0000000074BBF000-memory.dmp

    Filesize

    4KB

  • memory/3476-24-0x0000000074BB0000-0x0000000075360000-memory.dmp

    Filesize

    7.7MB