Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 22:00

General

  • Target

    916a6f1bb094aaac72113f36853d2dae.exe

  • Size

    404KB

  • MD5

    916a6f1bb094aaac72113f36853d2dae

  • SHA1

    a1c66603a24baa57fb1d4d8d9d8d7bf2a3840bb6

  • SHA256

    bf66b9c7e3b1905ad96a528a89e2216ae28f090e20d30f3ee6f2787e17ad1960

  • SHA512

    bb185aed5c2e53c407e80006abeb11b3b9339169578d7d1370b22a72a4d9aab63f840ebd20c8839c1a453db9766d325bd8b543afc6ae0abb24a0cf5155d7a51d

  • SSDEEP

    6144:MEu3SOig5G3txkE9gt+MNbh/9Ercvk4TbAerf53Alc1LjaaIWXlqyw3KI:MEu7D5IXkE9gt+qHnR0lylqCI

Malware Config

Extracted

Family

redline

Botnet

10

C2

lllwyerxedo.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
    "C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
      C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-7-0x0000000073FC0000-0x00000000746AE000-memory.dmp
    Filesize

    6.9MB

  • memory/1636-1-0x0000000073FC0000-0x00000000746AE000-memory.dmp
    Filesize

    6.9MB

  • memory/1636-2-0x0000000073FC0000-0x00000000746AE000-memory.dmp
    Filesize

    6.9MB

  • memory/1636-3-0x0000000000630000-0x0000000000670000-memory.dmp
    Filesize

    256KB

  • memory/1636-4-0x0000000000260000-0x0000000000282000-memory.dmp
    Filesize

    136KB

  • memory/1636-0-0x0000000000F50000-0x0000000000FB8000-memory.dmp
    Filesize

    416KB

  • memory/2712-15-0x0000000000C20000-0x0000000000C66000-memory.dmp
    Filesize

    280KB

  • memory/2712-11-0x0000000000590000-0x00000000005DA000-memory.dmp
    Filesize

    296KB

  • memory/2712-9-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/2712-14-0x0000000002460000-0x00000000024A0000-memory.dmp
    Filesize

    256KB

  • memory/2712-5-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/2712-13-0x0000000002460000-0x00000000024A0000-memory.dmp
    Filesize

    256KB

  • memory/2712-12-0x0000000002460000-0x00000000024A0000-memory.dmp
    Filesize

    256KB

  • memory/2712-8-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/2712-10-0x0000000073F40000-0x000000007462E000-memory.dmp
    Filesize

    6.9MB

  • memory/2712-16-0x0000000073F40000-0x000000007462E000-memory.dmp
    Filesize

    6.9MB

  • memory/2712-17-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/2712-18-0x0000000002460000-0x00000000024A0000-memory.dmp
    Filesize

    256KB

  • memory/2712-19-0x0000000002460000-0x00000000024A0000-memory.dmp
    Filesize

    256KB

  • memory/2712-20-0x0000000002460000-0x00000000024A0000-memory.dmp
    Filesize

    256KB