Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 08:20

General

  • Target

    b43d95a738a1a7df7245a3fcb11b3d37.exe

  • Size

    202KB

  • MD5

    b43d95a738a1a7df7245a3fcb11b3d37

  • SHA1

    b000576e0a198e364af0e07eeb13f993e43643ea

  • SHA256

    94e830018fa0898f97b4fc3206d53889ec7a4c042960604ddacc504d8b30263a

  • SHA512

    04045eaf33bb19e347f890d8c3fee682c8c03575d585c5b52e05afd813c6d7fbb9f634f2b40187c85a09d6b433971d3848bd1fdd4671bfd7b32c4dcafd2b4951

  • SSDEEP

    3072:PyLT1pRNE9Sof7at5ytD153ZlwQNdMUXDOF3hFVIgrFukl7Csd:0hpRNOSQatKDPZ+maDVzxuklr

Malware Config

Extracted

Family

redline

Botnet

@youlovedevil

C2

45.81.227.32:22625

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b43d95a738a1a7df7245a3fcb11b3d37.exe
    "C:\Users\Admin\AppData\Local\Temp\b43d95a738a1a7df7245a3fcb11b3d37.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\AppData\Local\Temp\b43d95a738a1a7df7245a3fcb11b3d37.exe
      "{path}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:988

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b43d95a738a1a7df7245a3fcb11b3d37.exe.log

    Filesize

    418B

    MD5

    98eea38457c9976c0ec48b5a70964041

    SHA1

    281ec6ada096be89ade13852ca86edfe42ffe3c1

    SHA256

    4a7455429d6f3c7390f97bc406d0bcc7d64ddff6bee5ffa9e88c5a75f806bfcf

    SHA512

    adb7bb4e1434d743932890aede4daa55c6e9f091415292775313dd172949fbd415f124c97e017a8204aab530b6184f196ab5cce005781b0853ffccc620f07530

  • memory/988-17-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/988-16-0x0000000005BD0000-0x00000000061E8000-memory.dmp

    Filesize

    6.1MB

  • memory/988-23-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/988-15-0x0000000004B30000-0x0000000004BC2000-memory.dmp

    Filesize

    584KB

  • memory/988-14-0x0000000074AC0000-0x0000000075270000-memory.dmp

    Filesize

    7.7MB

  • memory/988-22-0x0000000074AC0000-0x0000000075270000-memory.dmp

    Filesize

    7.7MB

  • memory/988-21-0x0000000005750000-0x000000000585A000-memory.dmp

    Filesize

    1.0MB

  • memory/988-19-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/988-20-0x00000000055B0000-0x00000000055FC000-memory.dmp

    Filesize

    304KB

  • memory/988-13-0x0000000000510000-0x000000000052E000-memory.dmp

    Filesize

    120KB

  • memory/988-18-0x0000000004EB0000-0x0000000004EEC000-memory.dmp

    Filesize

    240KB

  • memory/4196-7-0x0000000005640000-0x000000000564C000-memory.dmp

    Filesize

    48KB

  • memory/4196-4-0x0000000005440000-0x000000000546E000-memory.dmp

    Filesize

    184KB

  • memory/4196-5-0x0000000004F80000-0x0000000004F86000-memory.dmp

    Filesize

    24KB

  • memory/4196-0-0x0000000000AD0000-0x0000000000B0C000-memory.dmp

    Filesize

    240KB

  • memory/4196-3-0x00000000056B0000-0x00000000056C0000-memory.dmp

    Filesize

    64KB

  • memory/4196-11-0x0000000074AC0000-0x0000000075270000-memory.dmp

    Filesize

    7.7MB

  • memory/4196-8-0x0000000005770000-0x000000000580C000-memory.dmp

    Filesize

    624KB

  • memory/4196-2-0x0000000005430000-0x0000000005436000-memory.dmp

    Filesize

    24KB

  • memory/4196-6-0x00000000091F0000-0x0000000009794000-memory.dmp

    Filesize

    5.6MB

  • memory/4196-1-0x0000000074AC0000-0x0000000075270000-memory.dmp

    Filesize

    7.7MB