Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
9001B4D829EAC33F2B06AB34BBEF7480.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9001B4D829EAC33F2B06AB34BBEF7480.exe
Resource
win10v2004-20240412-en
General
-
Target
9001B4D829EAC33F2B06AB34BBEF7480.exe
-
Size
95KB
-
MD5
9001b4d829eac33f2b06ab34bbef7480
-
SHA1
108914745f61a7502a382871345d4af604814823
-
SHA256
7981bc15a329fe58ae76f26d03fbcab5d7c32658f29a1529d4d83b9e377a81a4
-
SHA512
511cedc75dc75eef63953f7238d1d7f25b6ffc0e36f0f6e0589d58f642b4c87607a70414305905a7b57295ebe176bf51c1a84d0308f0f93287e52b3afd3b4cea
-
SSDEEP
1536:WqsoPqsglbG6jejoigIn43Ywzi0Zb78ivombfexv0ujXyyed2jtQulgS6pE:E2fwYn+zi0ZbYe1g0ujyzdlE
Malware Config
Extracted
redline
--- https://t.me/BlToolsCloud ------ https://t.me/BlTools_Logs ---
rights-mountains.gl.at.ply.gg:23403
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3728-0-0x0000000000C20000-0x0000000000C3E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3728-0-0x0000000000C20000-0x0000000000C3E000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3728 9001B4D829EAC33F2B06AB34BBEF7480.exe