Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2024 07:39

General

  • Target

    916a6f1bb094aaac72113f36853d2dae.exe

  • Size

    404KB

  • MD5

    916a6f1bb094aaac72113f36853d2dae

  • SHA1

    a1c66603a24baa57fb1d4d8d9d8d7bf2a3840bb6

  • SHA256

    bf66b9c7e3b1905ad96a528a89e2216ae28f090e20d30f3ee6f2787e17ad1960

  • SHA512

    bb185aed5c2e53c407e80006abeb11b3b9339169578d7d1370b22a72a4d9aab63f840ebd20c8839c1a453db9766d325bd8b543afc6ae0abb24a0cf5155d7a51d

  • SSDEEP

    6144:MEu3SOig5G3txkE9gt+MNbh/9Ercvk4TbAerf53Alc1LjaaIWXlqyw3KI:MEu7D5IXkE9gt+qHnR0lylqCI

Malware Config

Extracted

Family

redline

Botnet

10

C2

lllwyerxedo.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
    "C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
      C:\Users\Admin\AppData\Local\Temp\916a6f1bb094aaac72113f36853d2dae.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2340-8-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/2340-14-0x0000000000460000-0x00000000004A6000-memory.dmp
    Filesize

    280KB

  • memory/2340-10-0x0000000074030000-0x000000007471E000-memory.dmp
    Filesize

    6.9MB

  • memory/2340-18-0x00000000022C0000-0x0000000002300000-memory.dmp
    Filesize

    256KB

  • memory/2340-4-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/2340-17-0x00000000022C0000-0x0000000002300000-memory.dmp
    Filesize

    256KB

  • memory/2340-7-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/2340-9-0x0000000000380000-0x00000000003CA000-memory.dmp
    Filesize

    296KB

  • memory/2340-16-0x0000000074030000-0x000000007471E000-memory.dmp
    Filesize

    6.9MB

  • memory/2340-19-0x00000000022C0000-0x0000000002300000-memory.dmp
    Filesize

    256KB

  • memory/2340-11-0x00000000022C0000-0x0000000002300000-memory.dmp
    Filesize

    256KB

  • memory/2340-12-0x00000000022C0000-0x0000000002300000-memory.dmp
    Filesize

    256KB

  • memory/2340-13-0x00000000022C0000-0x0000000002300000-memory.dmp
    Filesize

    256KB

  • memory/2340-15-0x00000000022C0000-0x0000000002300000-memory.dmp
    Filesize

    256KB

  • memory/2416-1-0x00000000740B0000-0x000000007479E000-memory.dmp
    Filesize

    6.9MB

  • memory/2416-2-0x0000000002110000-0x0000000002150000-memory.dmp
    Filesize

    256KB

  • memory/2416-6-0x00000000740B0000-0x000000007479E000-memory.dmp
    Filesize

    6.9MB

  • memory/2416-3-0x0000000000200000-0x0000000000222000-memory.dmp
    Filesize

    136KB

  • memory/2416-0-0x0000000000310000-0x0000000000378000-memory.dmp
    Filesize

    416KB