Analysis
-
max time kernel
162s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 16:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8f971c054cd506d521cd458102d4025f.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
8f971c054cd506d521cd458102d4025f.exe
-
Size
199KB
-
MD5
8f971c054cd506d521cd458102d4025f
-
SHA1
5c938e37701bc4a287343b283938bdcb1c0f27b0
-
SHA256
935a82b438893da3447df6631f85b494e48c474b410d09199b9a80359506232c
-
SHA512
50733b0fa5748bc6b0145b1139d56a3af96f5c9aa9b337063f3484ad5e4bb012db1615675ad8c78842eb49ccca475493de90a7a733fe01fe341bd5f818e856d3
-
SSDEEP
3072:b2HR1GaR3X65QahMBrvvbbk9alOx9IqjSLseQOOtpQWtgX/:b2h65QahMBzvbbtOT9jSLseQNPQWtg
Malware Config
Extracted
Family
redline
Botnet
@kexit99
C2
45.81.227.32:22625
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
resource yara_rule behavioral1/memory/2852-10-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/2852-14-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/2852-15-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/2852-23-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/2852-20-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/2852-9-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/2852-25-0x0000000004A90000-0x0000000004AD0000-memory.dmp family_redline behavioral1/memory/2852-27-0x0000000004A90000-0x0000000004AD0000-memory.dmp family_redline -
SectopRAT payload 8 IoCs
resource yara_rule behavioral1/memory/2852-10-0x0000000000080000-0x000000000009E000-memory.dmp family_sectoprat behavioral1/memory/2852-14-0x0000000000080000-0x000000000009E000-memory.dmp family_sectoprat behavioral1/memory/2852-15-0x0000000000080000-0x000000000009E000-memory.dmp family_sectoprat behavioral1/memory/2852-23-0x0000000000080000-0x000000000009E000-memory.dmp family_sectoprat behavioral1/memory/2852-20-0x0000000000080000-0x000000000009E000-memory.dmp family_sectoprat behavioral1/memory/2852-9-0x0000000000080000-0x000000000009E000-memory.dmp family_sectoprat behavioral1/memory/2852-25-0x0000000004A90000-0x0000000004AD0000-memory.dmp family_sectoprat behavioral1/memory/2852-27-0x0000000004A90000-0x0000000004AD0000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2740 set thread context of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2852 8f971c054cd506d521cd458102d4025f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27 PID 2740 wrote to memory of 2852 2740 8f971c054cd506d521cd458102d4025f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f971c054cd506d521cd458102d4025f.exe"C:\Users\Admin\AppData\Local\Temp\8f971c054cd506d521cd458102d4025f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\8f971c054cd506d521cd458102d4025f.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2852
-