Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
2322804b8d184e80d018766484fe325a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2322804b8d184e80d018766484fe325a.exe
Resource
win10v2004-20231215-en
General
-
Target
2322804b8d184e80d018766484fe325a.exe
-
Size
386KB
-
MD5
2322804b8d184e80d018766484fe325a
-
SHA1
737e5cfc3472026d0d37edc07c66e3e35290fa22
-
SHA256
1f6bd429f0a5f2762658f181a8654016b1599edd08242f8b90689e47652ba6e5
-
SHA512
95071c1968f855665d89f419d47e3931393d3deebe66212cee6f2f9cbb9cd73b6e190246af5f4296779347497e8544b63cf48be52e8cab03d57e1ab3f883a6d8
-
SSDEEP
6144:oVauyWCy4krUNGoo8GlsKEGksfwcrW1LN7TvHbv3nGZKQqO1lIefWa:W9Cy/INGooeKx7Wtljbe7BOa
Malware Config
Extracted
redline
SewPalpadin
185.215.113.114:8887
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/2844-4-0x00000000025E0000-0x0000000002600000-memory.dmp family_redline behavioral2/memory/2844-10-0x0000000002600000-0x000000000261E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
resource yara_rule behavioral2/memory/2844-4-0x00000000025E0000-0x0000000002600000-memory.dmp family_sectoprat behavioral2/memory/2844-10-0x0000000002600000-0x000000000261E000-memory.dmp family_sectoprat behavioral2/memory/2844-14-0x0000000004C90000-0x0000000004CA0000-memory.dmp family_sectoprat behavioral2/memory/2844-22-0x0000000004C90000-0x0000000004CA0000-memory.dmp family_sectoprat behavioral2/memory/2844-24-0x0000000004C90000-0x0000000004CA0000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 2322804b8d184e80d018766484fe325a.exe