Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:50

General

  • Target

    2322804b8d184e80d018766484fe325a.exe

  • Size

    386KB

  • MD5

    2322804b8d184e80d018766484fe325a

  • SHA1

    737e5cfc3472026d0d37edc07c66e3e35290fa22

  • SHA256

    1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5

  • SHA512

    95071c1968f855665d89f419d47e3931393d3deebe66212cee6f2f9cbb9cd73b6e190246af5f4296779347497e8544b63cf48be52e8cab03d57e1ab3f883a6d8

  • SSDEEP

    6144:oVauyWCy4krUNGoo8GlsKEGksfwcrW1LN7TvHbv3nGZKQqO1lIefWa:W9Cy/INGooeKx7Wtljbe7BOa

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

185.215.113.114:8887

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2322804b8d184e80d018766484fe325a.exe
    "C:\Users\Admin\AppData\Local\Temp\2322804b8d184e80d018766484fe325a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2844

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2844-1-0x00000000006C0000-0x00000000007C0000-memory.dmp

    Filesize

    1024KB

  • memory/2844-2-0x0000000000620000-0x000000000064F000-memory.dmp

    Filesize

    188KB

  • memory/2844-3-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2844-5-0x0000000074CC0000-0x0000000075470000-memory.dmp

    Filesize

    7.7MB

  • memory/2844-4-0x00000000025E0000-0x0000000002600000-memory.dmp

    Filesize

    128KB

  • memory/2844-6-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2844-7-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2844-8-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2844-10-0x0000000002600000-0x000000000261E000-memory.dmp

    Filesize

    120KB

  • memory/2844-11-0x0000000005250000-0x0000000005868000-memory.dmp

    Filesize

    6.1MB

  • memory/2844-9-0x0000000004CA0000-0x0000000005244000-memory.dmp

    Filesize

    5.6MB

  • memory/2844-12-0x0000000004C10000-0x0000000004C22000-memory.dmp

    Filesize

    72KB

  • memory/2844-13-0x0000000004C30000-0x0000000004C6C000-memory.dmp

    Filesize

    240KB

  • memory/2844-15-0x0000000005870000-0x00000000058BC000-memory.dmp

    Filesize

    304KB

  • memory/2844-14-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2844-16-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2844-17-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2844-19-0x0000000000620000-0x000000000064F000-memory.dmp

    Filesize

    188KB

  • memory/2844-18-0x00000000006C0000-0x00000000007C0000-memory.dmp

    Filesize

    1024KB

  • memory/2844-20-0x0000000074CC0000-0x0000000075470000-memory.dmp

    Filesize

    7.7MB

  • memory/2844-22-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2844-23-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2844-24-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB