Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:09 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2828e87a24cde9ffa4d318a0a98fab8b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
2828e87a24cde9ffa4d318a0a98fab8b.exe
-
Size
395KB
-
MD5
2828e87a24cde9ffa4d318a0a98fab8b
-
SHA1
b8e22b39aebeb2724ce7f8d2edcfcdbe07bbf908
-
SHA256
b30c723982534b09ac7736e33151c7093403b96e8cbc0c9aa58bd7cfcb6a7e32
-
SHA512
d8cd026bbb4f218f8d3d44a139cf36e8052120980a7bae2e9ffbd0a24697de658d19889c9335f0aae812a0af75c993c7e2456e7a3efd8fb0cd77e392f2e3ecf1
-
SSDEEP
12288:Ncylz6dN4ClchyO1niS7xai10M4ypSJI:56dN4CluD10dy
Malware Config
Extracted
Family
redline
Botnet
MIX 26.07
C2
185.215.113.17:18597
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/776-6-0x0000000000510000-0x0000000000532000-memory.dmp family_redline behavioral1/memory/776-9-0x0000000001F90000-0x0000000001FB0000-memory.dmp family_redline -
SectopRAT payload 4 IoCs
resource yara_rule behavioral1/memory/776-6-0x0000000000510000-0x0000000000532000-memory.dmp family_sectoprat behavioral1/memory/776-7-0x0000000004810000-0x0000000004850000-memory.dmp family_sectoprat behavioral1/memory/776-9-0x0000000001F90000-0x0000000001FB0000-memory.dmp family_sectoprat behavioral1/memory/776-10-0x0000000004810000-0x0000000004850000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 2828e87a24cde9ffa4d318a0a98fab8b.exe
Processes
Network
- No results found
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
No results found