Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe
Resource
win10v2004-20231215-en
General
-
Target
98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe
-
Size
193KB
-
MD5
98b7e1cd5ac9c7c6ea2362d8b13d53e5
-
SHA1
368c18b73587cac5615ed148715063500a115a08
-
SHA256
9697f2beb7e3fcae40a7ae2cea7111087c2e57c3407c135b281fefd9e13ae5b5
-
SHA512
2a625246f85307fb6112bb9ef3871aa8b14aa63a4088eaeae0f0af0ac112a5b3d4898324e0201a9918e1443e5e2ca496bce616700565ade549141fc8d4a42fe7
-
SSDEEP
6144:p4UdizUJiprVVeJewv3S+ZYkM5W8w2eJCh:di42xVe4w5ZlM5Rw2
Malware Config
Extracted
redline
@first_namer
45.67.231.221:52112
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral2/memory/4000-6-0x0000000005050000-0x0000000005076000-memory.dmp family_redline behavioral2/memory/1424-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/1424-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/1424-11-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 4 IoCs
resource yara_rule behavioral2/memory/4000-6-0x0000000005050000-0x0000000005076000-memory.dmp family_sectoprat behavioral2/memory/1424-9-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral2/memory/1424-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral2/memory/1424-11-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4000 set thread context of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\test.txt 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe Token: SeDebugPrivilege 1424 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84 PID 4000 wrote to memory of 1424 4000 98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe"C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe"C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe.log
Filesize507B
MD5fbbe9ef4bde3c4741d6594df07376e00
SHA10b5f78af5b858b5c956851b90dd4b98279b35c69
SHA256c91ce86f4465270635a5f259cfd947d0b1c9b419b1291ba1093c28371ef01fed
SHA51268f766de726957e80002bd6020269b71698a0a4581ef955474ad98b99b9a89a111496fc7094cc5a810eec0e32a178c13b0355940b1ab788032004b3a25a0903e