Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 06:25

General

  • Target

    d36fc7cc5e39090c25293cfcb7f6a169.exe

  • Size

    365KB

  • MD5

    d36fc7cc5e39090c25293cfcb7f6a169

  • SHA1

    828b607017225dbe91483b98d7640ebb106fc7b8

  • SHA256

    dc6ab2d39b66aeb2292fd6d29bd6196182a9e6912c9fd87df2c9727b2e513667

  • SHA512

    a241c0aab4b4869fc62f16d97e4728ba9c94f9e292763b19b4af4be870bdc8148c853f6f48c20397e8974f7de902124a9bf36a942050cc4fbc29b0d3826177f0

  • SSDEEP

    6144:Hdj5zKWOSW3i+g+FKfuFFPQqfcIeWYPufjI/XGE+OSCkQHoPbB8so:HjKWNh+g+FhRQqWWA+ekQIP

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

193.233.48.58:38989

Attributes
  • auth_value

    7a741aa449c2131b60755b6dc189af74

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d36fc7cc5e39090c25293cfcb7f6a169.exe
    "C:\Users\Admin\AppData\Local\Temp\d36fc7cc5e39090c25293cfcb7f6a169.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2452-1-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/2452-2-0x00000000002B0000-0x00000000002EA000-memory.dmp

    Filesize

    232KB

  • memory/2452-3-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2452-4-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2452-5-0x0000000001ED0000-0x0000000001F06000-memory.dmp

    Filesize

    216KB

  • memory/2452-6-0x0000000002040000-0x0000000002074000-memory.dmp

    Filesize

    208KB

  • memory/2452-7-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-8-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-10-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-12-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-14-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-20-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-22-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-18-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-16-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-24-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-26-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-28-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-30-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-32-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-34-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-36-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-38-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-40-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-42-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-44-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-46-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-48-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-50-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-52-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-54-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-56-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-58-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-60-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-62-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-68-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-66-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-70-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-64-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/2452-961-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/2452-962-0x00000000002B0000-0x00000000002EA000-memory.dmp

    Filesize

    232KB

  • memory/2452-963-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB