Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2025 21:17

General

  • Target

    20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe

  • Size

    1.3MB

  • MD5

    7980d99f45fbdbce92c3c62a0332b376

  • SHA1

    6694940c2f13486c0a1bc76b0cd35c90687b2537

  • SHA256

    20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39

  • SHA512

    1b6d11c6ab6effd3095cd5b351177400b03cae65b5d944570ddd080ab605b16b351888767ec58cdd75048f352c15b39deb79cb61c8df761896938e46b247a7a2

  • SSDEEP

    24576:0RJIrpWaTHaEQbav1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:0cFWaDZQ2jLoyEkmZ9Y14

Malware Config

Extracted

Family

redline

Botnet

redko

C2

62.204.41.170:4179

Attributes
  • auth_value

    9bcf7b0620ff067017d66b9a5d80b547

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe
    "C:\Users\Admin\AppData\Local\Temp\20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hook.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hook.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\loda.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\loda.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\redko.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\redko.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hook.exe

    Filesize

    192KB

    MD5

    cd804ba80f2ec30311965af7071eb96a

    SHA1

    d2256177e0e934624e0821a86c9aeffb075607e9

    SHA256

    cabfabebf356f52925d5b5aa2a50e4979e020db5cca00f3e36c94aacff53fe8d

    SHA512

    bce8b566fac667133a8ffc1c4be5dd6ea4eaa7ec9de8a3127b589606902476f974fcf6e9db331e3768d301b64234fac26a2e83fbbd1eaf3846495dc6f76da608

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\loda.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\redko.exe

    Filesize

    175KB

    MD5

    bc928465d24e037fb2009bd5668c80f5

    SHA1

    3ac1119fe355f2dae8d78bbe867c0cd24b9564a2

    SHA256

    1ab89ee322d5eb379129abd500726a8d709899b44f12825457902d360810f38c

    SHA512

    951621178d8e0f63daea8e725d1e19968b7da3714b66f82a6ab6ef075a7b1fbb295b92efa9e57f06b6e5dda126c5e5927fb190fde0944c5a55ed69e98ee2cfe6

  • memory/1148-27-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/1148-3-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/1148-24-0x0000000000710000-0x0000000000810000-memory.dmp

    Filesize

    1024KB

  • memory/1148-25-0x0000000000230000-0x000000000029B000-memory.dmp

    Filesize

    428KB

  • memory/1148-1-0x0000000000710000-0x0000000000810000-memory.dmp

    Filesize

    1024KB

  • memory/1148-26-0x0000000000400000-0x00000000005D9000-memory.dmp

    Filesize

    1.8MB

  • memory/1148-2-0x0000000000230000-0x000000000029B000-memory.dmp

    Filesize

    428KB

  • memory/2264-22-0x000007FEF57C3000-0x000007FEF57C4000-memory.dmp

    Filesize

    4KB

  • memory/2264-23-0x0000000000A90000-0x0000000000A9A000-memory.dmp

    Filesize

    40KB

  • memory/2264-28-0x000007FEF57C3000-0x000007FEF57C4000-memory.dmp

    Filesize

    4KB

  • memory/2280-35-0x0000000001200000-0x0000000001232000-memory.dmp

    Filesize

    200KB