Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 06:09
Behavioral task
behavioral1
Sample
ab303da731cc95c5118ed3b381c417ab.exe
Resource
win7-20240220-en
5 signatures
150 seconds
General
-
Target
ab303da731cc95c5118ed3b381c417ab.exe
-
Size
216KB
-
MD5
ab303da731cc95c5118ed3b381c417ab
-
SHA1
724ce3ba4cbee36fe6a90f9377aa4455fc5e8e67
-
SHA256
e2dba259192d31594e6352774f189b38d680789d8a481a8d873d01d89f20d23a
-
SHA512
6b506709ed1b9bab7603f00be2ca37d7d61faa0f5585580f14a6339e1920bd9d710dcc83602e85791357460f8993516ab5c1a2911f9110040530168c521ce08e
-
SSDEEP
3072:6i86AdOC6SfPCSeQz2kT3LubyddWsvE/sB09pX:J7Adr6iNe4Sy3ksA
Malware Config
Extracted
Family
redline
Botnet
5050
C2
2.56.59.235:61159
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-0-0x0000000000820000-0x000000000085A000-memory.dmp family_redline behavioral1/memory/2348-4-0x0000000004FF0000-0x0000000005030000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-0-0x0000000000820000-0x000000000085A000-memory.dmp family_sectoprat behavioral1/memory/2348-2-0x0000000004FF0000-0x0000000005030000-memory.dmp family_sectoprat behavioral1/memory/2348-4-0x0000000004FF0000-0x0000000005030000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ab303da731cc95c5118ed3b381c417ab.exedescription pid process Token: SeDebugPrivilege 2348 ab303da731cc95c5118ed3b381c417ab.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2348-0-0x0000000000820000-0x000000000085A000-memory.dmpFilesize
232KB
-
memory/2348-1-0x0000000074550000-0x0000000074C3E000-memory.dmpFilesize
6.9MB
-
memory/2348-2-0x0000000004FF0000-0x0000000005030000-memory.dmpFilesize
256KB
-
memory/2348-3-0x0000000074550000-0x0000000074C3E000-memory.dmpFilesize
6.9MB
-
memory/2348-4-0x0000000004FF0000-0x0000000005030000-memory.dmpFilesize
256KB