Behavioral task
behavioral1
Sample
af92d8b9354a0252b62b6635c221d99e1e87ed34df5f505b55e07a6dd79f2642.exe
Resource
win7-20230220-en
General
-
Target
af92d8b9354a0252b62b6635c221d99e1e87ed34df5f505b55e07a6dd79f2642.zip
-
Size
43KB
-
MD5
257f46e6b7f500dffaa914f4936cf916
-
SHA1
85640da2d72f9d3ccb3b5d605cb234b51205317b
-
SHA256
8aac9aa0952e39d3d8ecc58c240d186b85f4d5c1750790b75832f30cd73966ec
-
SHA512
31834936088185a4f920887ccab15a5618accde94eaf99d06a7037d34470d5e814dd6a13d227f1de1b7caa6920736f554577956ec1e786d9958e0edc6edd4bf8
-
SSDEEP
768:bSYu+f+aWGuS0FrCsZyEh5fnub3Vbwj2U5zc5IEWvg6iCqZU1YM6KnHI4pNZEmKJ:bS3+f+aWpSmrC5PDyjNc5IEThmRZOn
Malware Config
Extracted
redline
cheat
86.107.103.208:8160
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/af92d8b9354a0252b62b6635c221d99e1e87ed34df5f505b55e07a6dd79f2642 family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/af92d8b9354a0252b62b6635c221d99e1e87ed34df5f505b55e07a6dd79f2642 family_sectoprat -
Sectoprat family
Files
-
af92d8b9354a0252b62b6635c221d99e1e87ed34df5f505b55e07a6dd79f2642.zip.zip
Password: infected
-
af92d8b9354a0252b62b6635c221d99e1e87ed34df5f505b55e07a6dd79f2642.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ