Analysis Overview
SHA256
b83faaa540ef13e08d4538798104d23e5719a0c8603d238e24b5cb05dfaa166d
Threat Level: Known bad
The file b83faaa540ef13e08d4538798104d23e5719a0c8603d238e24b5cb05dfaa166d was found to be: Known bad.
Malicious Activity Summary
RedLine payload
SectopRAT payload
RedLine
SectopRAT
Redline family
Sectoprat family
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-04-19 16:45
Signatures
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Redline family
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Sectoprat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-19 16:45
Reported
2024-04-19 16:49
Platform
win7-20240221-en
Max time kernel
146s
Max time network
153s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.exe
"C:\Users\Admin\AppData\Local\Temp\5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:18950 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 3.125.102.39:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.102.39:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.102.39:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.102.39:18950 | 0.tcp.eu.ngrok.io | tcp |
Files
memory/1152-0-0x00000000011C0000-0x00000000011DE000-memory.dmp
memory/1152-1-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/1152-2-0x00000000047F0000-0x0000000004830000-memory.dmp
memory/1152-3-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/1152-4-0x00000000047F0000-0x0000000004830000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-19 16:45
Reported
2024-04-19 16:48
Platform
win10v2004-20240412-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.exe
"C:\Users\Admin\AppData\Local\Temp\5ecf0dade29bc4365035554275d07a72b112d0b6bc7487cef6a1c40ed50ea28e.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 136.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| NL | 23.62.61.113:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 21.114.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 113.61.62.23.in-addr.arpa | udp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 65.139.73.23.in-addr.arpa | udp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.211.222.173.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:18950 | 0.tcp.eu.ngrok.io | tcp |
Files
memory/1400-0-0x00000000008F0000-0x000000000090E000-memory.dmp
memory/1400-1-0x00000000746F0000-0x0000000074EA0000-memory.dmp
memory/1400-2-0x00000000058F0000-0x0000000005F08000-memory.dmp
memory/1400-3-0x00000000052D0000-0x00000000052E2000-memory.dmp
memory/1400-4-0x0000000005330000-0x000000000536C000-memory.dmp
memory/1400-5-0x00000000052C0000-0x00000000052D0000-memory.dmp
memory/1400-6-0x0000000005370000-0x00000000053BC000-memory.dmp
memory/1400-7-0x00000000055C0000-0x00000000056CA000-memory.dmp
memory/1400-8-0x00000000746F0000-0x0000000074EA0000-memory.dmp
memory/1400-9-0x00000000052C0000-0x00000000052D0000-memory.dmp