Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 03:49

General

  • Target

    2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44.exe

  • Size

    657KB

  • MD5

    3d6832a200701888feee0bbb2dc580fb

  • SHA1

    f46833d9fbf7c0df0414a4aacf2e95a3922102ad

  • SHA256

    2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44

  • SHA512

    7d17c63981cdcd56039b6dc15e20ac8a52eb1f799ab65bfb044ac50a3d937691f6f1e0a986a855d1a55ccb88eb718de706e6eb786f072602fd6e2a799d2838da

  • SSDEEP

    12288:cMrXy90P+cWMcQC70dxGGKcs2VTKufCqAXhHxDzkFl2FOb+oJ6ZxBP:byU+cWMcQB9nsATK9qohRGcfoJkx5

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44.exe
    "C:\Users\Admin\AppData\Local\Temp\2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrB80.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrB80.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dlh76.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dlh76.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrB80.exe

    Filesize

    512KB

    MD5

    6941bad8b07135f1b181bf0b8cbb8ffb

    SHA1

    57de6025aba199fdad5ab48fde37d31ae036d936

    SHA256

    7d12009f5d740dcbf8c5c17e9afd1be3204752e75f267674b986ebc8f711e1aa

    SHA512

    50854a0bb12d8a23afa30de3b1c5293bd190bb3d693660fd0ef7440e00d22f819c1a3567000dd0a73398dc55fe01f5841ca85e6005adf7835d49d5957f79ac2b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dlh76.exe

    Filesize

    285KB

    MD5

    fedf16f09251d8609500419e3c262080

    SHA1

    ed407237b4a6f6b7145ccd97d4e830bf56b34438

    SHA256

    b376ab7ab350cf1e8af37e54f7184c1e2c28599ef594c76d6e87e996a67e620c

    SHA512

    158d7bdd79a609c7b3332fe5a913fb0c5f84947d3cd05b152a2aca368c6d06372e45a5d9b39789741c2ddbb70e1975cff5ad9641ebb63e028f5ad0433fcce1fc

  • memory/4436-15-0x00000000009E0000-0x0000000000AE0000-memory.dmp

    Filesize

    1024KB

  • memory/4436-16-0x0000000000930000-0x000000000097B000-memory.dmp

    Filesize

    300KB

  • memory/4436-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4436-18-0x0000000000400000-0x00000000007A3000-memory.dmp

    Filesize

    3.6MB

  • memory/4436-19-0x0000000002590000-0x00000000025D6000-memory.dmp

    Filesize

    280KB

  • memory/4436-20-0x0000000005030000-0x00000000055D4000-memory.dmp

    Filesize

    5.6MB

  • memory/4436-21-0x0000000002960000-0x00000000029A4000-memory.dmp

    Filesize

    272KB

  • memory/4436-61-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-85-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-83-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-81-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-79-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-77-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-75-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-73-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-71-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-69-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-67-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-65-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-64-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-57-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-53-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-51-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-49-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-47-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-45-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-43-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-41-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-39-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-37-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-35-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-33-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-31-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-29-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-27-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-25-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-23-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-59-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-55-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-22-0x0000000002960000-0x000000000299E000-memory.dmp

    Filesize

    248KB

  • memory/4436-928-0x00000000055E0000-0x0000000005BF8000-memory.dmp

    Filesize

    6.1MB

  • memory/4436-929-0x0000000005C00000-0x0000000005D0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4436-930-0x0000000005D10000-0x0000000005D22000-memory.dmp

    Filesize

    72KB

  • memory/4436-931-0x0000000005D30000-0x0000000005D6C000-memory.dmp

    Filesize

    240KB

  • memory/4436-932-0x0000000005E70000-0x0000000005EBC000-memory.dmp

    Filesize

    304KB

  • memory/4436-933-0x00000000009E0000-0x0000000000AE0000-memory.dmp

    Filesize

    1024KB

  • memory/4436-934-0x0000000000930000-0x000000000097B000-memory.dmp

    Filesize

    300KB

  • memory/4436-935-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB