Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 05:24

General

  • Target

    6822eb1aff53fb4bdaea87306e8f9a815f07275e71bd55731fbbaa704f79d369.exe

  • Size

    479KB

  • MD5

    6ca5468364f5c18b99ed3093a3a6ab93

  • SHA1

    bb9780484558839d5941c7039931bd9515fb51d7

  • SHA256

    6822eb1aff53fb4bdaea87306e8f9a815f07275e71bd55731fbbaa704f79d369

  • SHA512

    44c32f1f940603e5b2084ace7246c1e1c777e5bfb765143c9098237f9dcaa316e26a05f23f7c62ad03f93137b5b73994d4f1d069b0f482e92ac56ebe7a265e06

  • SSDEEP

    12288:XMrEy90jroITXNvu8sayu4QJN8fbn8SVj0jQTa5Jhy:LyDIb4ayLC4n7kQTT

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6822eb1aff53fb4bdaea87306e8f9a815f07275e71bd55731fbbaa704f79d369.exe
    "C:\Users\Admin\AppData\Local\Temp\6822eb1aff53fb4bdaea87306e8f9a815f07275e71bd55731fbbaa704f79d369.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7363175.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7363175.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8852411.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8852411.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7363175.exe

    Filesize

    307KB

    MD5

    324520851e40d8927b4d4ddbde902c9d

    SHA1

    65b7cc98760eed0fba640a9cedd158d9753c8cc7

    SHA256

    5bb68b1e6d56dbeadc79edbd4ebc12684d3ad9b69601b8415010f6e26a8be3ec

    SHA512

    fa44249a482f1333fad80633e54861995b522e9f5c7c61dbcee43b4a6293092ea62d78fd575daa371feeaf24f42842d4a89d66abc73a0ccc5661d1d17edf0a8f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8852411.exe

    Filesize

    168KB

    MD5

    f43ea376554e1bce0061a938ef28782d

    SHA1

    dff31f3a652938862eca5c286ffb7bfa38c96b27

    SHA256

    8a9c7bc932f6937bc363477cf6e522b8f48c8ab7b4fa4803fcf087d4e7e5c99a

    SHA512

    3af7e5f6d03321ed8d94e189448d01dfcd66a59b3ba1ef650b0ca73f3a061566aab342ab188f8f9780f988502c8d41073b863a7b46a479a9b75921d8fea1a061

  • memory/1656-14-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

    Filesize

    4KB

  • memory/1656-15-0x0000000000010000-0x0000000000040000-memory.dmp

    Filesize

    192KB

  • memory/1656-16-0x0000000004930000-0x0000000004936000-memory.dmp

    Filesize

    24KB

  • memory/1656-17-0x000000000A450000-0x000000000AA68000-memory.dmp

    Filesize

    6.1MB

  • memory/1656-18-0x0000000009FC0000-0x000000000A0CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1656-19-0x0000000009EF0000-0x0000000009F02000-memory.dmp

    Filesize

    72KB

  • memory/1656-20-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB

  • memory/1656-21-0x0000000009F50000-0x0000000009F8C000-memory.dmp

    Filesize

    240KB

  • memory/1656-22-0x0000000004420000-0x000000000446C000-memory.dmp

    Filesize

    304KB

  • memory/1656-23-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

    Filesize

    4KB

  • memory/1656-24-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB