Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 14:45

General

  • Target

    56bf0659c6d08974d34baa2a8206524e.exe

  • Size

    339KB

  • MD5

    56bf0659c6d08974d34baa2a8206524e

  • SHA1

    127723ec5579db705169e2a1e02977c9db004989

  • SHA256

    7bcac3d96ae069bc795f7173619fa1bcaccb59ebcc2c3bc3622657ffc93ff4dd

  • SHA512

    ac19775cd7be879e9d6f69c634befdad3027de21617c6788423186990e0406235cfbaaa66b92d740f29553784f5c59faafcd29a912c6599001a6a65e241a3b53

  • SSDEEP

    6144:aE17Fdr0XLPRLrgR87AIEV2hhtMuz2GcGsEN5+Gzu:nzr0XLPpgRWAIWI2/GsENlzu

Malware Config

Extracted

Family

redline

Botnet

Install bot

C2

94.103.9.181:12765

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56bf0659c6d08974d34baa2a8206524e.exe
    "C:\Users\Admin\AppData\Local\Temp\56bf0659c6d08974d34baa2a8206524e.exe"
    1⤵
      PID:3568

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3568-1-0x0000000002C70000-0x0000000002D70000-memory.dmp

      Filesize

      1024KB

    • memory/3568-2-0x0000000004760000-0x0000000004790000-memory.dmp

      Filesize

      192KB

    • memory/3568-3-0x0000000004910000-0x0000000004936000-memory.dmp

      Filesize

      152KB

    • memory/3568-4-0x0000000000400000-0x0000000002B60000-memory.dmp

      Filesize

      39.4MB

    • memory/3568-6-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB

    • memory/3568-7-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB

    • memory/3568-5-0x0000000007130000-0x00000000076D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3568-9-0x0000000004D60000-0x0000000004D84000-memory.dmp

      Filesize

      144KB

    • memory/3568-8-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB

    • memory/3568-10-0x0000000007820000-0x00000000078B2000-memory.dmp

      Filesize

      584KB

    • memory/3568-11-0x00000000742D0000-0x0000000074A80000-memory.dmp

      Filesize

      7.7MB

    • memory/3568-12-0x00000000078D0000-0x0000000007EE8000-memory.dmp

      Filesize

      6.1MB

    • memory/3568-14-0x0000000007FC0000-0x00000000080CA000-memory.dmp

      Filesize

      1.0MB

    • memory/3568-13-0x0000000007F90000-0x0000000007FA2000-memory.dmp

      Filesize

      72KB

    • memory/3568-15-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB

    • memory/3568-16-0x0000000009A60000-0x0000000009A9C000-memory.dmp

      Filesize

      240KB

    • memory/3568-17-0x0000000009B90000-0x0000000009BDC000-memory.dmp

      Filesize

      304KB

    • memory/3568-18-0x0000000000400000-0x0000000002B60000-memory.dmp

      Filesize

      39.4MB

    • memory/3568-19-0x0000000002C70000-0x0000000002D70000-memory.dmp

      Filesize

      1024KB

    • memory/3568-20-0x0000000004760000-0x0000000004790000-memory.dmp

      Filesize

      192KB

    • memory/3568-23-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB

    • memory/3568-22-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB

    • memory/3568-24-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB

    • memory/3568-25-0x00000000742D0000-0x0000000074A80000-memory.dmp

      Filesize

      7.7MB

    • memory/3568-26-0x0000000004D80000-0x0000000004D90000-memory.dmp

      Filesize

      64KB