Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 22:00

General

  • Target

    916a6f1bb094aaac72113f36853d2dae.exe

  • Size

    404KB

  • MD5

    916a6f1bb094aaac72113f36853d2dae

  • SHA1

    a1c66603a24baa57fb1d4d8d9d8d7bf2a3840bb6

  • SHA256

    bf66b9c7e3b1905ad96a528a89e2216ae28f090e20d30f3ee6f2787e17ad1960

  • SHA512

    bb185aed5c2e53c407e80006abeb11b3b9339169578d7d1370b22a72a4d9aab63f840ebd20c8839c1a453db9766d325bd8b543afc6ae0abb24a0cf5155d7a51d

  • SSDEEP

    6144:MEu3SOig5G3txkE9gt+MNbh/9Ercvk4TbAerf53Alc1LjaaIWXlqyw3KI:MEu7D5IXkE9gt+qHnR0lylqCI

Malware Config

Extracted

Family

redline

Botnet

10

C2

lllwyerxedo.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
    "C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
      C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\916a6f1bb094aaac72113f36853d2dae.exe.log
    Filesize

    605B

    MD5

    3654bd2c6957761095206ffdf92b0cb9

    SHA1

    6f10f7b5867877de7629afcff644c265e79b4ad3

    SHA256

    c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4

    SHA512

    e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79

  • memory/1028-11-0x00000000747A0000-0x0000000074F50000-memory.dmp
    Filesize

    7.7MB

  • memory/1028-1-0x0000000000510000-0x0000000000578000-memory.dmp
    Filesize

    416KB

  • memory/1028-2-0x00000000747A0000-0x0000000074F50000-memory.dmp
    Filesize

    7.7MB

  • memory/1028-3-0x0000000004F70000-0x0000000004F80000-memory.dmp
    Filesize

    64KB

  • memory/1028-4-0x0000000000F80000-0x0000000000FA2000-memory.dmp
    Filesize

    136KB

  • memory/1028-5-0x0000000005270000-0x00000000052E6000-memory.dmp
    Filesize

    472KB

  • memory/1028-6-0x0000000005210000-0x000000000522E000-memory.dmp
    Filesize

    120KB

  • memory/1028-0-0x00000000747A0000-0x0000000074F50000-memory.dmp
    Filesize

    7.7MB

  • memory/4244-18-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB

  • memory/4244-21-0x0000000006870000-0x0000000006E88000-memory.dmp
    Filesize

    6.1MB

  • memory/4244-12-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/4244-9-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/4244-15-0x00000000747D0000-0x0000000074F80000-memory.dmp
    Filesize

    7.7MB

  • memory/4244-14-0x0000000002EB0000-0x0000000002EFA000-memory.dmp
    Filesize

    296KB

  • memory/4244-16-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB

  • memory/4244-7-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/4244-17-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB

  • memory/4244-20-0x00000000055D0000-0x0000000005616000-memory.dmp
    Filesize

    280KB

  • memory/4244-19-0x0000000005CA0000-0x0000000006244000-memory.dmp
    Filesize

    5.6MB

  • memory/4244-10-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/4244-22-0x00000000056B0000-0x00000000056C2000-memory.dmp
    Filesize

    72KB

  • memory/4244-23-0x0000000005730000-0x000000000576C000-memory.dmp
    Filesize

    240KB

  • memory/4244-24-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB

  • memory/4244-25-0x0000000005770000-0x00000000057BC000-memory.dmp
    Filesize

    304KB

  • memory/4244-26-0x00000000059C0000-0x0000000005ACA000-memory.dmp
    Filesize

    1.0MB

  • memory/4244-27-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/4244-28-0x00000000747D0000-0x0000000074F80000-memory.dmp
    Filesize

    7.7MB

  • memory/4244-29-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB

  • memory/4244-30-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB

  • memory/4244-31-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB

  • memory/4244-32-0x00000000056E0000-0x00000000056F0000-memory.dmp
    Filesize

    64KB