Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 13:54
Behavioral task
behavioral1
Sample
buildrobert.exe
Resource
win7-20230824-en
5 signatures
150 seconds
General
-
Target
buildrobert.exe
-
Size
95KB
-
MD5
0d513ebe640b1c1ed0181a95ec244293
-
SHA1
a89b12f9ab27cce0776aa4f5257ede3a30da23d3
-
SHA256
2510c6b6dfb999750d61ce39828c59d2cf8b43917b179e0d65ea70d087ed0a37
-
SHA512
b4fefcf03f80d17c478a7d278360f2155be6a80f79de03077b6a2bb5d53eedf1545e6ad5caa5369a616ce86b9e310fa5efc1e5b2b5ddd4ea9753d3b958dc5892
-
SSDEEP
1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2K3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdI8
Malware Config
Extracted
Family
redline
Botnet
cheat
C2
15.228.188.221:29991
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1936-0-0x0000000000270000-0x000000000028E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1936-0-0x0000000000270000-0x000000000028E000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1936 buildrobert.exe