Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 17:46
Behavioral task
behavioral1
Sample
1947626a9da397ee1e3a537ed7b266d31531ad3d27eaf63c6b607db359788248.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
1947626a9da397ee1e3a537ed7b266d31531ad3d27eaf63c6b607db359788248.exe
-
Size
95KB
-
MD5
9ed248a55397b97d052a432e3799578c
-
SHA1
147e67e09d8724d4a8e09e889f6a03aafc947487
-
SHA256
1947626a9da397ee1e3a537ed7b266d31531ad3d27eaf63c6b607db359788248
-
SHA512
eb9d97f6c859c0d0f60e1ba0fda85893d2c00ec3f9d5a607e0e33e07aede1e624c1a92eff6fc4a0ed67d1b120a90482115a56694011dfac3ad9287c9bb479a68
-
SSDEEP
1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2CtmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdm8
Malware Config
Extracted
Family
redline
Botnet
XenLogs
C2
45.77.240.40:25887
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/696-0-0x0000000000480000-0x000000000049E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/696-0-0x0000000000480000-0x000000000049E000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 696 1947626a9da397ee1e3a537ed7b266d31531ad3d27eaf63c6b607db359788248.exe