Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 16:26

General

  • Target

    9001B4D829EAC33F2B06AB34BBEF7480.exe

  • Size

    95KB

  • MD5

    9001b4d829eac33f2b06ab34bbef7480

  • SHA1

    108914745f61a7502a382871345d4af604814823

  • SHA256

    7981bc15a329fe58ae76f26d03fbcab5d7c32658f29a1529d4d83b9e377a81a4

  • SHA512

    511cedc75dc75eef63953f7238d1d7f25b6ffc0e36f0f6e0589d58f642b4c87607a70414305905a7b57295ebe176bf51c1a84d0308f0f93287e52b3afd3b4cea

  • SSDEEP

    1536:WqsoPqsglbG6jejoigIn43Ywzi0Zb78ivombfexv0ujXyyed2jtQulgS6pE:E2fwYn+zi0ZbYe1g0ujyzdlE

Malware Config

Extracted

Family

redline

Botnet

--- https://t.me/BlToolsCloud ------ https://t.me/BlTools_Logs ---

C2

rights-mountains.gl.at.ply.gg:23403

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9001B4D829EAC33F2B06AB34BBEF7480.exe
    "C:\Users\Admin\AppData\Local\Temp\9001B4D829EAC33F2B06AB34BBEF7480.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3728-0-0x0000000000C20000-0x0000000000C3E000-memory.dmp

    Filesize

    120KB

  • memory/3728-1-0x0000000075340000-0x0000000075AF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3728-2-0x0000000005D30000-0x0000000006348000-memory.dmp

    Filesize

    6.1MB

  • memory/3728-3-0x00000000055E0000-0x00000000055F2000-memory.dmp

    Filesize

    72KB

  • memory/3728-4-0x0000000005640000-0x000000000567C000-memory.dmp

    Filesize

    240KB

  • memory/3728-5-0x0000000005700000-0x0000000005710000-memory.dmp

    Filesize

    64KB

  • memory/3728-6-0x0000000005680000-0x00000000056CC000-memory.dmp

    Filesize

    304KB

  • memory/3728-7-0x00000000058F0000-0x00000000059FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3728-8-0x0000000075340000-0x0000000075AF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3728-9-0x0000000005700000-0x0000000005710000-memory.dmp

    Filesize

    64KB