Malware Analysis Report

2024-09-11 08:56

Sample ID 240402-me35dafc69
Target 2740-32-0x0000000000400000-0x000000000041E000-memory.dmp
SHA256 4d3b1886fb6f3e68fea2c9c86995153793debd2414547a4d515bdb87c5929686
Tags
cheat redline sectoprat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4d3b1886fb6f3e68fea2c9c86995153793debd2414547a4d515bdb87c5929686

Threat Level: Known bad

The file 2740-32-0x0000000000400000-0x000000000041E000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

cheat redline sectoprat

SectopRAT payload

Sectoprat family

RedLine payload

Redline family

Unsigned PE

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-02 10:23

Signatures

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-02 10:23

Reported

2024-04-02 10:23

Platform

win7-20240215-en

Max time kernel

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-02 10:23

Reported

2024-04-02 10:23

Platform

win10v2004-20240226-en

Max time kernel

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 udp

Files

N/A