Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
35cfccf5d14427f7c804312acf914ac2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
35cfccf5d14427f7c804312acf914ac2.exe
Resource
win10v2004-20231215-en
General
-
Target
35cfccf5d14427f7c804312acf914ac2.exe
-
Size
202KB
-
MD5
35cfccf5d14427f7c804312acf914ac2
-
SHA1
53474d5b1217b29c4eafcc0d60da60e1a4600cc7
-
SHA256
fa85c2dd434176da1bb226c0f3ecfcc4109bea4f9a7b6317eb7a97f29724d4c9
-
SHA512
10cd1319705aa3f857c32896bbe2924ce7cb91537b5289c95daacba8277eb9802d3ea37559a8db9ca7dfb2c1059dcaa5d74a2b8ccad695ea2c2baf3a1c1e68d2
-
SSDEEP
6144:ZPaSTDWB7wuh9suT7wxRxfsCJe0YDJfqn+:ZPaSUwuhB7UxfFoDJfq
Malware Config
Extracted
redline
@vertebrae7
45.81.227.32:22625
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/2212-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2212-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2212-17-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2212-15-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2212-13-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2212-22-0x0000000004B00000-0x0000000004B40000-memory.dmp family_redline -
SectopRAT payload 6 IoCs
resource yara_rule behavioral1/memory/2212-9-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2212-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2212-17-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2212-15-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2212-13-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2212-22-0x0000000004B00000-0x0000000004B40000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1052 set thread context of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2212 35cfccf5d14427f7c804312acf914ac2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28 PID 1052 wrote to memory of 2212 1052 35cfccf5d14427f7c804312acf914ac2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\35cfccf5d14427f7c804312acf914ac2.exe"C:\Users\Admin\AppData\Local\Temp\35cfccf5d14427f7c804312acf914ac2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\35cfccf5d14427f7c804312acf914ac2.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-