Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
56a2f136dabb15f592ee2cea513b162f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56a2f136dabb15f592ee2cea513b162f.exe
Resource
win10v2004-20231215-en
General
-
Target
56a2f136dabb15f592ee2cea513b162f.exe
-
Size
1.3MB
-
MD5
56a2f136dabb15f592ee2cea513b162f
-
SHA1
d4a78045bf565e136ff82c631656d5da10f018a5
-
SHA256
3e80779dd8960bf927d348f5e2d2068c9a86d4a194f4f24d02e84681d999b730
-
SHA512
f9bad086e8f4df6c25c9cd85a48d696753fc17eff76115ffebd1df9cfa04d47714b6896fd40bef697c3b66674fcf4895ed51da15fb4ae30a748cc04dd4eda624
-
SSDEEP
24576:q1VMNjHBMnKPCNys/5YgBu60Ehj+LNs8s89D19nu3:qEhHNPC/igUdEhjEs8Z9nE
Malware Config
Extracted
redline
@aran_welaso20
45.82.176.76:43679
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3644-3-0x0000000002A30000-0x0000000002A4E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3644-3-0x0000000002A30000-0x0000000002A4E000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3644 56a2f136dabb15f592ee2cea513b162f.exe