Resubmissions

23-06-2024 06:12

240623-gyd2psscqf 10

16-07-2023 19:09

230716-xt4pkahc8t 10

Analysis

  • max time kernel
    142s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2024 06:12

General

  • Target

    012700a41078e9d01c70955c50073da3b9b9a163c6fa5776195c278a70bf8c85.exe

  • Size

    572KB

  • MD5

    420622306beffd3306e285ea654ad117

  • SHA1

    49a77a1af0d9a93454b0dedb0429024c504f786d

  • SHA256

    012700a41078e9d01c70955c50073da3b9b9a163c6fa5776195c278a70bf8c85

  • SHA512

    7097900867b7c6c471cb24f880163ffb1b553c8ef31c36241272805508291d4a35604b1e94c396c87fa7ca1da534503638253ab8bc9f828fc31ccea9439f8e2c

  • SSDEEP

    12288:OMrvy90sthwYfZRMudCLVgXbOWVowB0d5uJk:Ny/nZKNqZTMuJk

Malware Config

Extracted

Family

redline

Botnet

duza

C2

83.97.73.129:19071

Attributes
  • auth_value

    787a4e3bbc78fd525526de1098cb0621

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\012700a41078e9d01c70955c50073da3b9b9a163c6fa5776195c278a70bf8c85.exe
    "C:\Users\Admin\AppData\Local\Temp\012700a41078e9d01c70955c50073da3b9b9a163c6fa5776195c278a70bf8c85.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597088.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597088.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7948424.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7948424.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8099591.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8099591.exe
          4⤵
          • Executes dropped EXE
          PID:2092

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597088.exe
    Filesize

    471KB

    MD5

    d891ec9efd849a9fbf547f45fb4ddf54

    SHA1

    977d6de0a0d6be50d5960d5cb2b909824b939519

    SHA256

    2709556a9f0d2fc9163212cbe9aea844a0b5dd40230134bfa00b22d087d2a632

    SHA512

    53507d87c85ea2a7b3edcf7c46a515355dfb90b8a9a074f3e440631a62585756a5629237a843b24fca057251eb51ce6aad806068c64fd541d416bc2791259526

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7948424.exe
    Filesize

    277KB

    MD5

    726008875886321d4176dfb70c9eb984

    SHA1

    2f12caac4cc6ee70832713661d24e30a91eae77c

    SHA256

    ccd0803aa6ef7a022b570a1bcab7358e2e4eab75d1e25a3f662c2b05eeaecb97

    SHA512

    38def2409d40be5a7f2ab833bcbc051d221bc0b80a7af7cd869de2629399abfd44dab9240607c028a550a0f015f00a1f6133bf92aee1db2236e863d86fd6a506

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8099591.exe
    Filesize

    173KB

    MD5

    4ef751acb837690b6cf7e2a2beb977d9

    SHA1

    116169a3691e077725ed073a93d293be07ad5d65

    SHA256

    a9c74937900fc82a00b914ce467a52be727ed5c6f18fff9e0e5a17964b69ae96

    SHA512

    61c960498f179451f912b4f125640f133152248a80be1ee2ad6014bbb439c3784abdf6a71b0979468ceb69aa7c68787e537db4dd3644d61fa28ca72c4be6bab4

  • memory/2092-21-0x0000000000A70000-0x0000000000AA0000-memory.dmp
    Filesize

    192KB

  • memory/2092-22-0x0000000001290000-0x0000000001296000-memory.dmp
    Filesize

    24KB

  • memory/2092-23-0x0000000005B50000-0x0000000006168000-memory.dmp
    Filesize

    6.1MB

  • memory/2092-24-0x0000000005640000-0x000000000574A000-memory.dmp
    Filesize

    1.0MB

  • memory/2092-25-0x0000000005550000-0x0000000005562000-memory.dmp
    Filesize

    72KB

  • memory/2092-26-0x00000000055B0000-0x00000000055EC000-memory.dmp
    Filesize

    240KB

  • memory/2092-27-0x00000000055F0000-0x000000000563C000-memory.dmp
    Filesize

    304KB