Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 17:38
Behavioral task
behavioral1
Sample
ef82cf52cbcd8a2539aa6340d008b8eecd80d053cbe7a158226fc5c9555e0cbf.exe
Resource
win7-20240220-en
General
-
Target
ef82cf52cbcd8a2539aa6340d008b8eecd80d053cbe7a158226fc5c9555e0cbf.exe
-
Size
95KB
-
MD5
4860a69d64c373d0193977c602bd19fb
-
SHA1
9884d128436321f2f01d6137a47733664eafca29
-
SHA256
ef82cf52cbcd8a2539aa6340d008b8eecd80d053cbe7a158226fc5c9555e0cbf
-
SHA512
904d069fc663eb7192101cdd6edc8c0a209869cac455386bbf595b318f88b6fe2fc0d32d5c5c3b6a915ea2e90f696d43cf258db444bf575140c2907b089277c7
-
SSDEEP
1536:xqskjlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2V3teulgS6pk:fYUeYr+zi0ZbYe1g0ujyzdFk
Malware Config
Extracted
redline
cheat
38.181.15.1:28294
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1656-0-0x0000000001380000-0x000000000139E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1656-0-0x0000000001380000-0x000000000139E000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ef82cf52cbcd8a2539aa6340d008b8eecd80d053cbe7a158226fc5c9555e0cbf.exedescription pid process Token: SeDebugPrivilege 1656 ef82cf52cbcd8a2539aa6340d008b8eecd80d053cbe7a158226fc5c9555e0cbf.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1656-0-0x0000000001380000-0x000000000139E000-memory.dmpFilesize
120KB
-
memory/1656-1-0x00000000742C0000-0x00000000749AE000-memory.dmpFilesize
6.9MB
-
memory/1656-2-0x0000000004AE0000-0x0000000004B20000-memory.dmpFilesize
256KB
-
memory/1656-3-0x00000000742C0000-0x00000000749AE000-memory.dmpFilesize
6.9MB
-
memory/1656-4-0x0000000004AE0000-0x0000000004B20000-memory.dmpFilesize
256KB