Analysis
-
max time kernel
51s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 07:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a17dfb69ed9236941b11eedf66a5a4f.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
7a17dfb69ed9236941b11eedf66a5a4f.exe
-
Size
371KB
-
MD5
7a17dfb69ed9236941b11eedf66a5a4f
-
SHA1
5c66c69f6b2a90af84e216b794688ff49434ff9d
-
SHA256
ed099ecee0b1d8eefe0d68febba8ceba3d19cf8e5599ca2dac87e25f85eb09f9
-
SHA512
b2d46e3e0799e606739ec3b83e7e3a484fa6d0bb77b1939603c640d924e69bdf0b2d9a82819e84c519d8877732324a6b77adec1b156a2ad9a3d258d99b45a7ce
-
SSDEEP
6144:HpSQUmpzZE6MEs7PN4slZ75nh+g1Z9Pj8/TCm:JLEGo75wgS/R
Malware Config
Extracted
Family
redline
Botnet
@kaaazzs
C2
185.230.143.48:14462
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4000-6-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/4000-6-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1816 set thread context of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93 PID 1816 wrote to memory of 4000 1816 7a17dfb69ed9236941b11eedf66a5a4f.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a17dfb69ed9236941b11eedf66a5a4f.exe"C:\Users\Admin\AppData\Local\Temp\7a17dfb69ed9236941b11eedf66a5a4f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4000
-