Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2023 22:32

General

  • Target

    032d8f1caecf3c0fbc5042cc58f01cc0.exe

  • Size

    95KB

  • MD5

    032d8f1caecf3c0fbc5042cc58f01cc0

  • SHA1

    7f7313f9ac10f6518a5b4dc5e517c008094d6d3b

  • SHA256

    b6968227413ec29f05f304db416a61a4e33aad4c9eaada0d3eaf906b8beb1ad4

  • SHA512

    6469f6e0d446915d4b1e8ed1f0ecf0a3bc72feb0a7336a6c5e98ff3c6a28888e89a21e02971ba975671cb1a07ba681ecfcb519ee34489a8b3b2b9feb686536e9

  • SSDEEP

    1536:9qsCXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2ltmulgS6pY:rIgzWHY3+zi0ZbYe1g0ujyzddY

Malware Config

Extracted

Family

redline

Botnet

SOE

C2

20.100.178.240:13284

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\032d8f1caecf3c0fbc5042cc58f01cc0.exe
    "C:\Users\Admin\AppData\Local\Temp\032d8f1caecf3c0fbc5042cc58f01cc0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:308

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp56B3.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp56E8.tmp
    Filesize

    92KB

    MD5

    d6492f228d1417a459765d7b9657cbba

    SHA1

    ef73426c3634a16ac6c15803633e77035abd032c

    SHA256

    75fbdce4223e0df5805b3fddc158d6c955b34b2112ed83d9967e731cc9f8cfb7

    SHA512

    50c5c6955ac90ccc1602bc32fc2d03808f42fbde7be46c681d7b7e99eb4cfe222a868c6c73728e4afce1b5904d7b2148c29ed5b177c38a5c1bfaf047e86b5613

  • memory/308-54-0x0000000000260000-0x000000000027E000-memory.dmp
    Filesize

    120KB

  • memory/308-55-0x00000000009E0000-0x0000000000A20000-memory.dmp
    Filesize

    256KB

  • memory/308-134-0x00000000009E0000-0x0000000000A20000-memory.dmp
    Filesize

    256KB