Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 14:23

General

  • Target

    800f47454230a1f51c30a0f0b028c43f.exe

  • Size

    131KB

  • MD5

    800f47454230a1f51c30a0f0b028c43f

  • SHA1

    dcbc856d372bf3cf984a1e6b0a45242dca3f5c9b

  • SHA256

    054300b788c1435a8a5c381810c3d8d3f90acdaecfea88ea318f4cfc57f4ca1a

  • SHA512

    97382a4f854dc6b248d5b66454284d754c3dfc374443ff52239e1e1c0544aade148f1c4d27870f2c7908087f0157c382b2768b3e9d30eb3d1dcfcd25abfedfe4

  • SSDEEP

    3072:wLUmapmm6wjaqbwfJZqTSwQO8zcFfL6qTdNBMLmBvqi+7SyjR:Fpmm6wjZMHzwQO8zgBriaBSi+7p

Malware Config

Extracted

Family

redline

Botnet

build

C2

45.67.231.50:7452

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\800f47454230a1f51c30a0f0b028c43f.exe
    "C:\Users\Admin\AppData\Local\Temp\800f47454230a1f51c30a0f0b028c43f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Users\Admin\AppData\Local\Temp\800f47454230a1f51c30a0f0b028c43f.exe
      C:\Users\Admin\AppData\Local\Temp\800f47454230a1f51c30a0f0b028c43f.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3468

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\800f47454230a1f51c30a0f0b028c43f.exe.log

          Filesize

          605B

          MD5

          3654bd2c6957761095206ffdf92b0cb9

          SHA1

          6f10f7b5867877de7629afcff644c265e79b4ad3

          SHA256

          c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4

          SHA512

          e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79

        • memory/3468-13-0x00000000057C0000-0x00000000057FC000-memory.dmp

          Filesize

          240KB

        • memory/3468-14-0x0000000005880000-0x0000000005890000-memory.dmp

          Filesize

          64KB

        • memory/3468-19-0x0000000005880000-0x0000000005890000-memory.dmp

          Filesize

          64KB

        • memory/3468-18-0x0000000074B50000-0x0000000075300000-memory.dmp

          Filesize

          7.7MB

        • memory/3468-5-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/3468-17-0x0000000005C90000-0x0000000005CE0000-memory.dmp

          Filesize

          320KB

        • memory/3468-10-0x0000000074B50000-0x0000000075300000-memory.dmp

          Filesize

          7.7MB

        • memory/3468-9-0x0000000005EB0000-0x00000000064C8000-memory.dmp

          Filesize

          6.1MB

        • memory/3468-16-0x0000000005B30000-0x0000000005B54000-memory.dmp

          Filesize

          144KB

        • memory/3468-12-0x00000000059A0000-0x0000000005AAA000-memory.dmp

          Filesize

          1.0MB

        • memory/3468-11-0x0000000005720000-0x0000000005732000-memory.dmp

          Filesize

          72KB

        • memory/3468-15-0x0000000005AB0000-0x0000000005AFC000-memory.dmp

          Filesize

          304KB

        • memory/5080-0-0x00000000003C0000-0x00000000003E6000-memory.dmp

          Filesize

          152KB

        • memory/5080-8-0x0000000074B50000-0x0000000075300000-memory.dmp

          Filesize

          7.7MB

        • memory/5080-2-0x0000000004D60000-0x0000000004DD6000-memory.dmp

          Filesize

          472KB

        • memory/5080-1-0x0000000074B50000-0x0000000075300000-memory.dmp

          Filesize

          7.7MB

        • memory/5080-4-0x0000000004D40000-0x0000000004D5E000-memory.dmp

          Filesize

          120KB

        • memory/5080-3-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB