Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 23:37

General

  • Target

    b5f2049cce55c465bb3c4ed1ea424960.exe

  • Size

    3.3MB

  • MD5

    b5f2049cce55c465bb3c4ed1ea424960

  • SHA1

    99ad1dbf6ba2806fb73a3b48b2fc6544aa8510ef

  • SHA256

    3fb5d581908006ebf02c95e6811711a4c3fe211ec9e7ba029003894a60082e48

  • SHA512

    aa2c5dcb0c99e139815b3dab18630a754cb6ca79009d5055bf251885af22fa5311ce1598e9c2f7eba84d97682df04590a65437f02959f8058f940c89eb9d0a64

  • SSDEEP

    98304:45eezchKvrp1oBwwRjv50iry21hYJqdGxHprjbXAi3Lyrofv:ASAp1i9RjvHV1hMqd2HpF3fv

Malware Config

Extracted

Family

redline

Botnet

@SabayNigger

C2

185.241.54.128:47729

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5f2049cce55c465bb3c4ed1ea424960.exe
    "C:\Users\Admin\AppData\Local\Temp\b5f2049cce55c465bb3c4ed1ea424960.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\b5f2049cce55c465bb3c4ed1ea424960.exe
      C:\Users\Admin\AppData\Local\Temp\b5f2049cce55c465bb3c4ed1ea424960.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2016-48-0x0000000074CC0000-0x00000000753AE000-memory.dmp

          Filesize

          6.9MB

        • memory/2016-24-0x0000000074CC0000-0x00000000753AE000-memory.dmp

          Filesize

          6.9MB

        • memory/2016-2-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-3-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-4-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-5-0x0000000076CF0000-0x0000000076D37000-memory.dmp

          Filesize

          284KB

        • memory/2016-6-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-7-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-8-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-9-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-11-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-12-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-13-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-14-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-15-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-16-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-18-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-19-0x0000000077CB0000-0x0000000077CB2000-memory.dmp

          Filesize

          8KB

        • memory/2016-20-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-17-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-10-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-43-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-25-0x0000000000F90000-0x0000000001866000-memory.dmp

          Filesize

          8.8MB

        • memory/2016-26-0x0000000000F90000-0x0000000001866000-memory.dmp

          Filesize

          8.8MB

        • memory/2016-27-0x00000000055C0000-0x0000000005600000-memory.dmp

          Filesize

          256KB

        • memory/2016-28-0x0000000005600000-0x0000000005ED6000-memory.dmp

          Filesize

          8.8MB

        • memory/2016-1-0x0000000077790000-0x00000000778A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2016-0-0x0000000000F90000-0x0000000001866000-memory.dmp

          Filesize

          8.8MB

        • memory/2016-45-0x0000000076CF0000-0x0000000076D37000-memory.dmp

          Filesize

          284KB

        • memory/2016-41-0x0000000000F90000-0x0000000001866000-memory.dmp

          Filesize

          8.8MB

        • memory/2648-31-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-29-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-36-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-38-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-40-0x0000000000F90000-0x0000000001866000-memory.dmp

          Filesize

          8.8MB

        • memory/2648-47-0x00000000055D0000-0x0000000005610000-memory.dmp

          Filesize

          256KB

        • memory/2648-44-0x00000000003E0000-0x0000000000402000-memory.dmp

          Filesize

          136KB

        • memory/2648-42-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-51-0x0000000000460000-0x0000000000480000-memory.dmp

          Filesize

          128KB

        • memory/2648-30-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-34-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2648-53-0x0000000000F90000-0x0000000001866000-memory.dmp

          Filesize

          8.8MB

        • memory/2648-46-0x0000000074CC0000-0x00000000753AE000-memory.dmp

          Filesize

          6.9MB

        • memory/2648-49-0x00000000055D0000-0x0000000005610000-memory.dmp

          Filesize

          256KB

        • memory/2648-50-0x00000000055D0000-0x0000000005610000-memory.dmp

          Filesize

          256KB

        • memory/2648-32-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-52-0x00000000055D0000-0x0000000005610000-memory.dmp

          Filesize

          256KB

        • memory/2648-33-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-54-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2648-55-0x0000000074CC0000-0x00000000753AE000-memory.dmp

          Filesize

          6.9MB

        • memory/2648-56-0x00000000055D0000-0x0000000005610000-memory.dmp

          Filesize

          256KB

        • memory/2648-57-0x00000000055D0000-0x0000000005610000-memory.dmp

          Filesize

          256KB

        • memory/2648-58-0x00000000055D0000-0x0000000005610000-memory.dmp

          Filesize

          256KB