Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
f226f4c71bacea806ddbfdc6d306d731.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f226f4c71bacea806ddbfdc6d306d731.exe
Resource
win10v2004-20231215-en
General
-
Target
f226f4c71bacea806ddbfdc6d306d731.exe
-
Size
1.1MB
-
MD5
f226f4c71bacea806ddbfdc6d306d731
-
SHA1
8f5b36d145c9d5a9f0d83c218bf6b4db3f0b1b36
-
SHA256
b8b24d3548b1e89b15409aeeb77196f642644f9298f226b5e2d67997707532cd
-
SHA512
ab64c39c21bece38fec43deaec6c6fee91a94a3c17e7b123ce65eee1fef036c1bc121f9a36b6b8fed064385474c7a3d1af6f47af8af4053e1d03c67abd3fb0b8
-
SSDEEP
24576:+WXoBI/cm6NiGckmIypwRv0SxXQWoz6nIeH1Rp0P:+WXehhwB8oe7Rp
Malware Config
Extracted
redline
@MoneyCashTopP
178.154.198.178:35752
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2432-1-0x0000000000AA0000-0x0000000000E24000-memory.dmp family_sectoprat -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe 2432 f226f4c71bacea806ddbfdc6d306d731.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 f226f4c71bacea806ddbfdc6d306d731.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2432 f226f4c71bacea806ddbfdc6d306d731.exe