Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 21:17

General

  • Target

    20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe

  • Size

    1.3MB

  • MD5

    7980d99f45fbdbce92c3c62a0332b376

  • SHA1

    6694940c2f13486c0a1bc76b0cd35c90687b2537

  • SHA256

    20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39

  • SHA512

    1b6d11c6ab6effd3095cd5b351177400b03cae65b5d944570ddd080ab605b16b351888767ec58cdd75048f352c15b39deb79cb61c8df761896938e46b247a7a2

  • SSDEEP

    24576:0RJIrpWaTHaEQbav1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:0cFWaDZQ2jLoyEkmZ9Y14

Malware Config

Extracted

Family

redline

Botnet

redko

C2

62.204.41.170:4179

Attributes
  • auth_value

    9bcf7b0620ff067017d66b9a5d80b547

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe
    "C:\Users\Admin\AppData\Local\Temp\20dd70b7bab45ea7223d6567bca60d5ccce517e67b6b1ef9909940b610ee2c39.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hook.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hook.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\loda.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\loda.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\redko.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\redko.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hook.exe

    Filesize

    192KB

    MD5

    cd804ba80f2ec30311965af7071eb96a

    SHA1

    d2256177e0e934624e0821a86c9aeffb075607e9

    SHA256

    cabfabebf356f52925d5b5aa2a50e4979e020db5cca00f3e36c94aacff53fe8d

    SHA512

    bce8b566fac667133a8ffc1c4be5dd6ea4eaa7ec9de8a3127b589606902476f974fcf6e9db331e3768d301b64234fac26a2e83fbbd1eaf3846495dc6f76da608

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\loda.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\redko.exe

    Filesize

    175KB

    MD5

    bc928465d24e037fb2009bd5668c80f5

    SHA1

    3ac1119fe355f2dae8d78bbe867c0cd24b9564a2

    SHA256

    1ab89ee322d5eb379129abd500726a8d709899b44f12825457902d360810f38c

    SHA512

    951621178d8e0f63daea8e725d1e19968b7da3714b66f82a6ab6ef075a7b1fbb295b92efa9e57f06b6e5dda126c5e5927fb190fde0944c5a55ed69e98ee2cfe6

  • memory/840-23-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/840-2-0x00000000023A0000-0x000000000240B000-memory.dmp

    Filesize

    428KB

  • memory/840-3-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/840-1-0x00000000007A0000-0x00000000008A0000-memory.dmp

    Filesize

    1024KB

  • memory/840-20-0x0000000000400000-0x00000000005D9000-memory.dmp

    Filesize

    1.8MB

  • memory/840-21-0x00000000007A0000-0x00000000008A0000-memory.dmp

    Filesize

    1024KB

  • memory/840-22-0x00000000023A0000-0x000000000240B000-memory.dmp

    Filesize

    428KB

  • memory/3572-18-0x00007FF8E2023000-0x00007FF8E2025000-memory.dmp

    Filesize

    8KB

  • memory/3572-24-0x00007FF8E2023000-0x00007FF8E2025000-memory.dmp

    Filesize

    8KB

  • memory/3572-19-0x0000000000F30000-0x0000000000F3A000-memory.dmp

    Filesize

    40KB

  • memory/3596-29-0x000000007403E000-0x000000007403F000-memory.dmp

    Filesize

    4KB

  • memory/3596-30-0x00000000007D0000-0x0000000000802000-memory.dmp

    Filesize

    200KB

  • memory/3596-31-0x0000000005730000-0x0000000005D48000-memory.dmp

    Filesize

    6.1MB

  • memory/3596-32-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3596-33-0x00000000051E0000-0x00000000051F2000-memory.dmp

    Filesize

    72KB

  • memory/3596-34-0x0000000005240000-0x000000000527C000-memory.dmp

    Filesize

    240KB

  • memory/3596-35-0x00000000053C0000-0x000000000540C000-memory.dmp

    Filesize

    304KB

  • memory/3596-37-0x000000007403E000-0x000000007403F000-memory.dmp

    Filesize

    4KB