Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 14:58

General

  • Target

    e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe

  • Size

    776KB

  • MD5

    a5f1d2b0754206f99ad204434058f29d

  • SHA1

    4741635dd9f9839771ee8d5c37a0270b5f3149f6

  • SHA256

    e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15

  • SHA512

    4ff320f9ebe550d20649d2e42a5cb58be6bf9ddf75a3c73a3840574b7b972bf56b07a578a9075812c28aca91f6fefa93492cffec7e3597cf1393cc487fc5937f

  • SSDEEP

    12288:3WASwBlF55OHTDPEZcq7fh2KFL/2geR2C0fteSU9WNBpjhi/P:3Z/FXOP2hpUMCQjXpjhi

Malware Config

Extracted

Family

redline

Botnet

LOGS

C2

87.120.120.86:1912

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe
    "C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe
      "C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe"
      2⤵
        PID:2112
      • C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe
        "C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe"
        2⤵
          PID:2848
        • C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe
          "C:\Users\Admin\AppData\Local\Temp\e844c45831ec146a5c82479c1381a32827034b11078e433870006e40ea13cf15.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2876

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2676-0-0x00000000742BE000-0x00000000742BF000-memory.dmp

        Filesize

        4KB

      • memory/2676-1-0x0000000000140000-0x0000000000208000-memory.dmp

        Filesize

        800KB

      • memory/2676-2-0x00000000742B0000-0x000000007499E000-memory.dmp

        Filesize

        6.9MB

      • memory/2676-3-0x00000000006E0000-0x00000000006F8000-memory.dmp

        Filesize

        96KB

      • memory/2676-4-0x00000000742BE000-0x00000000742BF000-memory.dmp

        Filesize

        4KB

      • memory/2676-5-0x00000000742B0000-0x000000007499E000-memory.dmp

        Filesize

        6.9MB

      • memory/2676-6-0x0000000004B50000-0x0000000004BE6000-memory.dmp

        Filesize

        600KB

      • memory/2676-21-0x00000000742B0000-0x000000007499E000-memory.dmp

        Filesize

        6.9MB

      • memory/2876-18-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2876-16-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2876-14-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2876-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2876-10-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2876-9-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2876-8-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2876-19-0x00000000742B0000-0x000000007499E000-memory.dmp

        Filesize

        6.9MB

      • memory/2876-20-0x00000000742B0000-0x000000007499E000-memory.dmp

        Filesize

        6.9MB

      • memory/2876-7-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2876-22-0x00000000742B0000-0x000000007499E000-memory.dmp

        Filesize

        6.9MB