Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 16:16

General

  • Target

    D1AF2776A0515FA6DE91ACB0A442048D.exe

  • Size

    96KB

  • MD5

    d1af2776a0515fa6de91acb0a442048d

  • SHA1

    78c76b53352d5eb9f2761d19a3063b203d369bad

  • SHA256

    972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248

  • SHA512

    b96feea2fff7f32fe3ed27c55b414bd56a56a680e2f056c8ababa278e753de680eb17ce509c1665de8477b07499ecdf0671bb36dd6515df130d1d32c0982ab5c

  • SSDEEP

    1536:DqsqmqnflbG6jejoigIi43Ywzi0Zb78ivombfexv0ujXyyed2CtQulgS6pE:xxw9Yi+zi0ZbYe1g0ujyzdGE

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

91.92.249.99:13359

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D1AF2776A0515FA6DE91ACB0A442048D.exe
    "C:\Users\Admin\AppData\Local\Temp\D1AF2776A0515FA6DE91ACB0A442048D.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a3237acdb29e37b72919700bc7ce4da2

    SHA1

    fc4b6daf25ecb8a248e2f95bc38d53e6769ef48a

    SHA256

    afed57bf96ae3751bda92f1482c95c3c1fe98d698a7d493f9683aa0b11c40d63

    SHA512

    ed2bb8661aadd549f23b55ecd18e1945ca75767c3b1a59d4901249354e1ee488e4df44864e80e717965e4a43d4378a9e8510c580a47a7f68577495b188a31c38

  • C:\Users\Admin\AppData\Local\Temp\Cab2973.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar29D3.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\tmp3094.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp30BA.tmp
    Filesize

    92KB

    MD5

    5f914a013176785e26d70d07234c605c

    SHA1

    5336e9ed6aeb682b46a0472f4f80ec24c4504210

    SHA256

    72b56bbce7e5e07702bf46a002c75cb3a8994fd390b190b989628d387d21975b

    SHA512

    103eff502bec0df1a36bd19a97ca1d10cc34da2183480fe146434ec916020011c8af003b66ab5f6f4886e95b21749be8d8c3c3ebf3ae1b2e5c6db216e8b4e1b2

  • memory/2884-0-0x000000007482E000-0x000000007482F000-memory.dmp
    Filesize

    4KB

  • memory/2884-1-0x00000000012A0000-0x00000000012BE000-memory.dmp
    Filesize

    120KB

  • memory/2884-2-0x0000000074820000-0x0000000074F0E000-memory.dmp
    Filesize

    6.9MB

  • memory/2884-152-0x0000000074820000-0x0000000074F0E000-memory.dmp
    Filesize

    6.9MB