Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 04:25

General

  • Target

    0c903acd8212b0e7d09f9a8c6a7ce909377951efb05ddd325ada1f374b06d30d.exe

  • Size

    566KB

  • MD5

    ffdbf2c5ae59e0d6f7947638752e9249

  • SHA1

    b6afeeec0198029e5ea0315790ef056ef5b64ef8

  • SHA256

    0c903acd8212b0e7d09f9a8c6a7ce909377951efb05ddd325ada1f374b06d30d

  • SHA512

    753efa4f5261689f2313359b1be2cae2c690a8fe243ed498597a80fc576571f2ce09c294ab3c774c01529dcd4ec4428911640c365615fb457ce077762ae7b7b6

  • SSDEEP

    12288:6Mr7y90PNOqvGneju5AQBqvoqFcfEBrrE2OHg2yOAYIr6rkBEr:5yQOIG3ADAqFoirrE2h+AYxkC

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c903acd8212b0e7d09f9a8c6a7ce909377951efb05ddd325ada1f374b06d30d.exe
    "C:\Users\Admin\AppData\Local\Temp\0c903acd8212b0e7d09f9a8c6a7ce909377951efb05ddd325ada1f374b06d30d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1214601.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1214601.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3851575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3851575.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1214601.exe

    Filesize

    307KB

    MD5

    580e9fc2578c9f77857adf5a6f5873bd

    SHA1

    b8832683a163deb49dd6dfd6e1f85ab347bc9813

    SHA256

    b6fc1473007d2590393b3a4a219a5847845038e2c935d108f690758bace43fd7

    SHA512

    2d989e87f2a1e83cb569e6d2f0e14f7ade74284bee2ff758d2649fc555205269c8199c9717c836310e779ffa9641f481cf7b4b7ea6514af520bbc09310ffdd35

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3851575.exe

    Filesize

    168KB

    MD5

    653f414b44421769eb7d67bf46ff9d7e

    SHA1

    1afb6a2c2ffffdebcf317c69afd499123d17f14a

    SHA256

    ff038c241696e8bb12073f7a6319a8b78aa746f1929456e6552e07b266b73354

    SHA512

    849a2d33cd59ec68fc59644f3431f369580cee94b526c7b165bba18ddfa4500b418fe3cf80164e21c68586d28c1c5477fd0784ff4883941ba11a8bd7e08bef3d

  • memory/2676-14-0x000000007429E000-0x000000007429F000-memory.dmp

    Filesize

    4KB

  • memory/2676-15-0x0000000000E70000-0x0000000000EA0000-memory.dmp

    Filesize

    192KB

  • memory/2676-16-0x0000000003100000-0x0000000003106000-memory.dmp

    Filesize

    24KB

  • memory/2676-17-0x0000000005DC0000-0x00000000063D8000-memory.dmp

    Filesize

    6.1MB

  • memory/2676-18-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2676-19-0x00000000057F0000-0x0000000005802000-memory.dmp

    Filesize

    72KB

  • memory/2676-20-0x0000000005850000-0x000000000588C000-memory.dmp

    Filesize

    240KB

  • memory/2676-21-0x0000000074290000-0x0000000074A40000-memory.dmp

    Filesize

    7.7MB

  • memory/2676-22-0x00000000059D0000-0x0000000005A1C000-memory.dmp

    Filesize

    304KB

  • memory/2676-23-0x000000007429E000-0x000000007429F000-memory.dmp

    Filesize

    4KB

  • memory/2676-24-0x0000000074290000-0x0000000074A40000-memory.dmp

    Filesize

    7.7MB