Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2024 21:14

General

  • Target

    7e0528c468de5e4a4724bbc03c388912.exe

  • Size

    100KB

  • MD5

    7e0528c468de5e4a4724bbc03c388912

  • SHA1

    ccbf81d5aeeb03dbdb49a37c5e33bc1e8e287de2

  • SHA256

    f3bd165982995400b2f861021e54b7b17f58fac7bf031e27a7edc34b8be0a936

  • SHA512

    75844dd619518c4f397c9093beb3cca3e5064082ad5732c17a6b84cd94b6ab3d182f1f78cedb3917aea1269e9d530ebeecce7f96af380b549b6a7279b7f5a3cd

  • SSDEEP

    1536:Mo6aGb2CT0jE68cZVCb5IBAPpkFauKwbeVgbue7vluvNyAsdRWetx5REnG6WAaoc:MdxyCT0DAb607lOe6nlulydddNW9K

Malware Config

Extracted

Family

redline

Botnet

@Qauelsb

C2

194.226.139.24:7732

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e0528c468de5e4a4724bbc03c388912.exe
    "C:\Users\Admin\AppData\Local\Temp\7e0528c468de5e4a4724bbc03c388912.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2908-0-0x0000000000E50000-0x0000000000E6E000-memory.dmp
    Filesize

    120KB

  • memory/2908-1-0x0000000074480000-0x0000000074B6E000-memory.dmp
    Filesize

    6.9MB

  • memory/2908-2-0x0000000004D90000-0x0000000004DD0000-memory.dmp
    Filesize

    256KB

  • memory/2908-3-0x0000000074480000-0x0000000074B6E000-memory.dmp
    Filesize

    6.9MB

  • memory/2908-4-0x0000000004D90000-0x0000000004DD0000-memory.dmp
    Filesize

    256KB