Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:48
Behavioral task
behavioral1
Sample
2093d467e65e9dbad2a55577d9f8d396.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2093d467e65e9dbad2a55577d9f8d396.exe
Resource
win10v2004-20231215-en
General
-
Target
2093d467e65e9dbad2a55577d9f8d396.exe
-
Size
100KB
-
MD5
2093d467e65e9dbad2a55577d9f8d396
-
SHA1
c1e80273574c80a82b90d021212d784c7a90ee4a
-
SHA256
3de11e9ba2b8db6be4069506a95bc31250d8ae8d0df5e8fec66121a05f1ccbc6
-
SHA512
b2a394cb9f444b14114d976745f2b36301a2b17954963fb8c54f384d9c069bfea5c05f2840f733d0a6eee12d643e02a4fe19eefa64195b73a32e5d53e9cbb920
-
SSDEEP
1536:oo6aGr2CT0jE68c8RdhXHyYopkKTgauKwjgbue7vluvLyAsd1vetx5REfG6WAao0:odxiCT0GRnC5lT3luzydd0NW1y
Malware Config
Extracted
redline
@JABKA9983
51.89.92.99:5965
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2060-1-0x00000000002E0000-0x00000000002FE000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2060-1-0x00000000002E0000-0x00000000002FE000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2093d467e65e9dbad2a55577d9f8d396.exedescription pid process Token: SeDebugPrivilege 2060 2093d467e65e9dbad2a55577d9f8d396.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2060-0-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/2060-1-0x00000000002E0000-0x00000000002FE000-memory.dmpFilesize
120KB
-
memory/2060-2-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/2060-3-0x0000000004CA0000-0x0000000004CB2000-memory.dmpFilesize
72KB
-
memory/2060-4-0x0000000004D00000-0x0000000004D3C000-memory.dmpFilesize
240KB
-
memory/2060-5-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/2060-6-0x0000000004D40000-0x0000000004D8C000-memory.dmpFilesize
304KB
-
memory/2060-7-0x0000000004FB0000-0x00000000050BA000-memory.dmpFilesize
1.0MB
-
memory/2060-8-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/2060-9-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB