Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 09:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4891df260f4154bdc68c84d672c3b0d2.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
4891df260f4154bdc68c84d672c3b0d2.exe
-
Size
330KB
-
MD5
4891df260f4154bdc68c84d672c3b0d2
-
SHA1
fc0cb885f4abcd4477796ed8bd2d89a3cc90afbf
-
SHA256
4b255928648623b33ead203ba323598bd376bf58aa34fc00e8eb3e562413a193
-
SHA512
a2f7f3de3d64577d9c5f1b935248ccf9314cab4850912aefaf86aed2fad3d2710f9d3a62fda9a001b5ff690293621e03c6adeb6fec31811409b1748bdf275f9f
-
SSDEEP
6144:no+eeTQur+FXKe8UZdeXAxcumCUlxiGsuihkRHyE9CaHwPrI6e:neeUur+FXKe/deXAPEJ/RHymCKGk
Malware Config
Extracted
Family
redline
Botnet
WW
C2
193.56.146.60:51431
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2460-4-0x0000000001D00000-0x0000000001D22000-memory.dmp family_redline behavioral1/memory/2460-9-0x00000000021D0000-0x00000000021F0000-memory.dmp family_redline behavioral1/memory/2460-6-0x0000000004990000-0x00000000049D0000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2460-4-0x0000000001D00000-0x0000000001D22000-memory.dmp family_sectoprat behavioral1/memory/2460-9-0x00000000021D0000-0x00000000021F0000-memory.dmp family_sectoprat behavioral1/memory/2460-6-0x0000000004990000-0x00000000049D0000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2460 4891df260f4154bdc68c84d672c3b0d2.exe