Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
025307069088cfb359731f34f3af68db.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
025307069088cfb359731f34f3af68db.exe
Resource
win10v2004-20231215-en
General
-
Target
025307069088cfb359731f34f3af68db.exe
-
Size
1.9MB
-
MD5
025307069088cfb359731f34f3af68db
-
SHA1
fec66a9c9c56c05c0550cb81b0d3169a37210d5f
-
SHA256
355c9f31d4f4cf6242a8bedf18d47dbcf2cf863abbe83acd6c8beb9e89e3aad2
-
SHA512
17692dbe5dd65ffb863ec1dfbf7fd7070b389c3607dd995b38bb7ea87f45fce1d74ceaf87348aa1320bc0581ac9ebc7cf5a3bd42ee852a9751abb9dd336d2219
-
SSDEEP
49152:n0Fu06MypMVPMB0MX6l7FhDft1BVe9YIJJOHa3q47s+Uu:n04GVPM0w87LDNVe903cs+3
Malware Config
Extracted
redline
54.38.123.247:8696
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2816-9-0x0000000000C40000-0x0000000001114000-memory.dmp family_sectoprat behavioral1/memory/2816-6-0x0000000000C40000-0x0000000001114000-memory.dmp family_sectoprat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 025307069088cfb359731f34f3af68db.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 025307069088cfb359731f34f3af68db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 025307069088cfb359731f34f3af68db.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine 025307069088cfb359731f34f3af68db.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 025307069088cfb359731f34f3af68db.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 025307069088cfb359731f34f3af68db.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2816 025307069088cfb359731f34f3af68db.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2816 025307069088cfb359731f34f3af68db.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 025307069088cfb359731f34f3af68db.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\025307069088cfb359731f34f3af68db.exe"C:\Users\Admin\AppData\Local\Temp\025307069088cfb359731f34f3af68db.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816