Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
5a3eb93564a49e7b6a645d74ee19ef58.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a3eb93564a49e7b6a645d74ee19ef58.exe
Resource
win10v2004-20231222-en
General
-
Target
5a3eb93564a49e7b6a645d74ee19ef58.exe
-
Size
263KB
-
MD5
5a3eb93564a49e7b6a645d74ee19ef58
-
SHA1
2bd82700c4a85bea93c990e892316364ace5e03d
-
SHA256
13c723d1548b43f711358b1dca9115c3bdd7932727e9927317d03dc5b5e925f2
-
SHA512
7632d20e67a4fcf05976f7747310837bd11f836011e5bdcc5cb7db2b9e38c403d3a2446f4e696d2850f20ddbcaaed191988b0e228cd5f959fc21b1aa26da3e63
-
SSDEEP
6144:9LIvLHiAxcXClwupeamgBGcOWemETBnHCLZRdtK:9UvLHiAgClpe5uGcOkgoLZRdw
Malware Config
Extracted
redline
185.215.113.29:8889
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/2576-3-0x0000000004C00000-0x0000000004C22000-memory.dmp family_redline behavioral2/memory/2576-6-0x0000000004F70000-0x0000000004F90000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/2576-3-0x0000000004C00000-0x0000000004C22000-memory.dmp family_sectoprat behavioral2/memory/2576-6-0x0000000004F70000-0x0000000004F90000-memory.dmp family_sectoprat behavioral2/memory/2576-21-0x0000000004F60000-0x0000000004F70000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 5a3eb93564a49e7b6a645d74ee19ef58.exe