Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 06:32

General

  • Target

    98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe

  • Size

    193KB

  • MD5

    98b7e1cd5ac9c7c6ea2362d8b13d53e5

  • SHA1

    368c18b73587cac5615ed148715063500a115a08

  • SHA256

    9697f2beb7e3fcae40a7ae2cea7111087c2e57c3407c135b281fefd9e13ae5b5

  • SHA512

    2a625246f85307fb6112bb9ef3871aa8b14aa63a4088eaeae0f0af0ac112a5b3d4898324e0201a9918e1443e5e2ca496bce616700565ade549141fc8d4a42fe7

  • SSDEEP

    6144:p4UdizUJiprVVeJewv3S+ZYkM5W8w2eJCh:di42xVe4w5ZlM5Rw2

Malware Config

Extracted

Family

redline

Botnet

@first_namer

C2

45.67.231.221:52112

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe
    "C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe
      "C:\Users\Admin\AppData\Local\Temp\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1424

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\98b7e1cd5ac9c7c6ea2362d8b13d53e5.exe.log

          Filesize

          507B

          MD5

          fbbe9ef4bde3c4741d6594df07376e00

          SHA1

          0b5f78af5b858b5c956851b90dd4b98279b35c69

          SHA256

          c91ce86f4465270635a5f259cfd947d0b1c9b419b1291ba1093c28371ef01fed

          SHA512

          68f766de726957e80002bd6020269b71698a0a4581ef955474ad98b99b9a89a111496fc7094cc5a810eec0e32a178c13b0355940b1ab788032004b3a25a0903e

        • memory/1424-18-0x0000000005560000-0x0000000005572000-memory.dmp

          Filesize

          72KB

        • memory/1424-17-0x0000000006530000-0x0000000006B48000-memory.dmp

          Filesize

          6.1MB

        • memory/1424-24-0x0000000005590000-0x00000000055A0000-memory.dmp

          Filesize

          64KB

        • memory/1424-23-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/1424-22-0x0000000007EC0000-0x0000000007FCA000-memory.dmp

          Filesize

          1.0MB

        • memory/1424-21-0x00000000063D0000-0x000000000641C000-memory.dmp

          Filesize

          304KB

        • memory/1424-16-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/1424-9-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/1424-10-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/1424-11-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/1424-20-0x0000000005590000-0x00000000055A0000-memory.dmp

          Filesize

          64KB

        • memory/1424-19-0x0000000005F50000-0x0000000005F8C000-memory.dmp

          Filesize

          240KB

        • memory/4000-7-0x0000000005680000-0x0000000005C24000-memory.dmp

          Filesize

          5.6MB

        • memory/4000-14-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4000-0-0x0000000000570000-0x00000000005A6000-memory.dmp

          Filesize

          216KB

        • memory/4000-1-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4000-2-0x0000000004EC0000-0x0000000004EEA000-memory.dmp

          Filesize

          168KB

        • memory/4000-6-0x0000000005050000-0x0000000005076000-memory.dmp

          Filesize

          152KB

        • memory/4000-5-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/4000-4-0x0000000009450000-0x00000000094EC000-memory.dmp

          Filesize

          624KB

        • memory/4000-3-0x00000000093B0000-0x0000000009442000-memory.dmp

          Filesize

          584KB