Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 06:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45917de21a6088ed41b735f04b8c441c.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
45917de21a6088ed41b735f04b8c441c.exe
-
Size
398KB
-
MD5
45917de21a6088ed41b735f04b8c441c
-
SHA1
7fcf57469babfbf6c99a611b0ed47eef7c4f6b6e
-
SHA256
3ef227459f5ea632eedaba68d9d410521e75e24c41a0de0cdf26084761fd6129
-
SHA512
9d1e5c4fbdb0ad07aa14d778c57a8ebefba98c86426845b140412343659f1861bffe0753fc074d6abc1e9d80fc2c2d3d0aae6b830686f82d6d840e1cc92dfa88
-
SSDEEP
12288:C359mzJvK0g1qTXHWvLSaS8ogvgiu0Hd6:1NvK0gvLS1cgid96
Malware Config
Extracted
Family
redline
Botnet
170
C2
147.124.222.75:42864
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2976-4-0x00000000003E0000-0x0000000000400000-memory.dmp family_redline behavioral1/memory/2976-6-0x0000000001E30000-0x0000000001E70000-memory.dmp family_redline behavioral1/memory/2976-8-0x0000000002070000-0x000000000208E000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2976-4-0x00000000003E0000-0x0000000000400000-memory.dmp family_sectoprat behavioral1/memory/2976-6-0x0000000001E30000-0x0000000001E70000-memory.dmp family_sectoprat behavioral1/memory/2976-8-0x0000000002070000-0x000000000208E000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 45917de21a6088ed41b735f04b8c441c.exe