Malware Analysis Report

2024-09-11 08:57

Sample ID 240512-qerywsbb29
Target build.exe
SHA256 0a9d28d765c5a993c88122a10b8e5f0875fc9db0c4f25bdcfbbf8efaebe02709
Tags
cheat redline sectoprat infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0a9d28d765c5a993c88122a10b8e5f0875fc9db0c4f25bdcfbbf8efaebe02709

Threat Level: Known bad

The file build.exe was found to be: Known bad.

Malicious Activity Summary

cheat redline sectoprat infostealer rat trojan

SectopRAT

RedLine payload

Redline family

SectopRAT payload

Sectoprat family

RedLine

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-12 13:10

Signatures

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-12 13:10

Reported

2024-05-12 13:13

Platform

win7-20240221-en

Max time kernel

133s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\build.exe

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Network

Country Destination Domain Proto
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp

Files

memory/1440-0-0x000000007405E000-0x000000007405F000-memory.dmp

memory/1440-1-0x0000000000D70000-0x0000000000D8E000-memory.dmp

memory/1440-2-0x0000000074050000-0x000000007473E000-memory.dmp

memory/1440-3-0x000000007405E000-0x000000007405F000-memory.dmp

memory/1440-4-0x0000000074050000-0x000000007473E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-12 13:10

Reported

2024-05-12 13:13

Platform

win10-20240404-en

Max time kernel

134s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\build.exe

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Network

Country Destination Domain Proto
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
US 8.8.8.8:53 14.179.89.13.in-addr.arpa udp

Files

memory/2084-0-0x000000007370E000-0x000000007370F000-memory.dmp

memory/2084-1-0x00000000008F0000-0x000000000090E000-memory.dmp

memory/2084-2-0x0000000005770000-0x0000000005D76000-memory.dmp

memory/2084-3-0x0000000005110000-0x0000000005122000-memory.dmp

memory/2084-4-0x00000000051A0000-0x00000000051DE000-memory.dmp

memory/2084-5-0x00000000051E0000-0x000000000522B000-memory.dmp

memory/2084-6-0x0000000073700000-0x0000000073DEE000-memory.dmp

memory/2084-7-0x0000000005420000-0x000000000552A000-memory.dmp

memory/2084-8-0x000000007370E000-0x000000007370F000-memory.dmp

memory/2084-9-0x0000000073700000-0x0000000073DEE000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-12 13:10

Reported

2024-05-12 13:13

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\build.exe

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Network

Country Destination Domain Proto
AR 181.47.208.50:48371 tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.105:443 www.bing.com tcp
US 8.8.8.8:53 105.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
AR 181.47.208.50:48371 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
US 8.8.8.8:53 14.179.89.13.in-addr.arpa udp

Files

memory/232-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

memory/232-1-0x0000000000E20000-0x0000000000E3E000-memory.dmp

memory/232-2-0x0000000005E70000-0x0000000006488000-memory.dmp

memory/232-3-0x00000000057E0000-0x00000000057F2000-memory.dmp

memory/232-4-0x0000000005850000-0x000000000588C000-memory.dmp

memory/232-5-0x0000000005890000-0x00000000058DC000-memory.dmp

memory/232-6-0x0000000074E40000-0x00000000755F0000-memory.dmp

memory/232-7-0x0000000005AF0000-0x0000000005BFA000-memory.dmp

memory/232-8-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

memory/232-9-0x0000000074E40000-0x00000000755F0000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-05-12 13:10

Reported

2024-05-12 13:13

Platform

win11-20240426-en

Max time kernel

131s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\build.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\build.exe

"C:\Users\Admin\AppData\Local\Temp\build.exe"

Network

Country Destination Domain Proto
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp
US 52.111.229.19:443 tcp
AR 181.47.208.50:48371 tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
AR 181.47.208.50:48371 tcp
AR 181.47.208.50:48371 tcp

Files

memory/4188-0-0x0000000074FCE000-0x0000000074FCF000-memory.dmp

memory/4188-1-0x0000000000C70000-0x0000000000C8E000-memory.dmp

memory/4188-2-0x0000000005C20000-0x0000000006238000-memory.dmp

memory/4188-3-0x00000000055B0000-0x00000000055C2000-memory.dmp

memory/4188-4-0x0000000005640000-0x000000000567C000-memory.dmp

memory/4188-5-0x0000000005680000-0x00000000056CC000-memory.dmp

memory/4188-6-0x0000000074FC0000-0x0000000075771000-memory.dmp

memory/4188-7-0x00000000058C0000-0x00000000059CA000-memory.dmp

memory/4188-8-0x0000000074FCE000-0x0000000074FCF000-memory.dmp

memory/4188-9-0x0000000074FC0000-0x0000000075771000-memory.dmp