Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
493d3458e77a3eef4d8fb20cab6e3cd9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
493d3458e77a3eef4d8fb20cab6e3cd9.exe
Resource
win10v2004-20231215-en
General
-
Target
493d3458e77a3eef4d8fb20cab6e3cd9.exe
-
Size
332KB
-
MD5
493d3458e77a3eef4d8fb20cab6e3cd9
-
SHA1
23def6243c2142b44de4a73a24de4e186f4929eb
-
SHA256
630249e0624415f6ab92fd59a4e2383868284bfc31b49a3b6980674c57f70663
-
SHA512
3926c346562d7959300e719232f2d7c4379c6fa5cd609b671f331453724af7a863f6d52f572ba65cdc9010d731a8cc4fc3e2c5e2243e52be41e379443bdc2129
-
SSDEEP
6144:yoxeQWHeUfxB4fjBZZzy5omD1WH99YuR36z53PYNiOju3Tgg+ou:ycc+MxB4Zzy5o/HbPJ6Ngg3Tgtb
Malware Config
Extracted
redline
paladin
178.63.26.132:29795
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1932-4-0x00000000021D0000-0x0000000002206000-memory.dmp family_redline behavioral1/memory/1932-6-0x0000000004EC0000-0x0000000004F00000-memory.dmp family_redline behavioral1/memory/1932-8-0x0000000002310000-0x0000000002344000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/memory/1932-4-0x00000000021D0000-0x0000000002206000-memory.dmp family_sectoprat behavioral1/memory/1932-6-0x0000000004EC0000-0x0000000004F00000-memory.dmp family_sectoprat behavioral1/memory/1932-8-0x0000000002310000-0x0000000002344000-memory.dmp family_sectoprat