Malware Analysis Report

2024-09-11 08:57

Sample ID 240516-gy6rqafg56
Target 210291d06eedacada6ac5ae3dbc7e55d4b95057fa99406d0bd97570eb10a89d8
SHA256 210291d06eedacada6ac5ae3dbc7e55d4b95057fa99406d0bd97570eb10a89d8
Tags
cheat redline sectoprat infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

210291d06eedacada6ac5ae3dbc7e55d4b95057fa99406d0bd97570eb10a89d8

Threat Level: Known bad

The file 210291d06eedacada6ac5ae3dbc7e55d4b95057fa99406d0bd97570eb10a89d8 was found to be: Known bad.

Malicious Activity Summary

cheat redline sectoprat infostealer rat trojan

RedLine

SectopRAT

RedLine payload

Redline family

SectopRAT payload

Sectoprat family

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-16 06:13

Signatures

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Sectoprat family

sectoprat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 06:13

Reported

2024-05-16 06:16

Platform

win7-20240220-en

Max time kernel

130s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe

"C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe"

Network

Country Destination Domain Proto
NL 91.92.249.99:13359 tcp
NL 91.92.249.99:13359 tcp
NL 91.92.249.99:13359 tcp
NL 91.92.249.99:13359 tcp
NL 91.92.249.99:13359 tcp
NL 91.92.249.99:13359 tcp

Files

memory/2088-0-0x00000000747CE000-0x00000000747CF000-memory.dmp

memory/2088-1-0x0000000000070000-0x000000000008E000-memory.dmp

memory/2088-2-0x00000000747C0000-0x0000000074EAE000-memory.dmp

memory/2088-3-0x00000000747CE000-0x00000000747CF000-memory.dmp

memory/2088-4-0x00000000747C0000-0x0000000074EAE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 06:13

Reported

2024-05-16 06:16

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe

"C:\Users\Admin\AppData\Local\Temp\972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 91.92.249.99:13359 tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.155:443 www.bing.com tcp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.155:443 www.bing.com tcp
US 8.8.8.8:53 155.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
NL 91.92.249.99:13359 tcp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
NL 91.92.249.99:13359 tcp
NL 91.92.249.99:13359 tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
NL 91.92.249.99:13359 tcp
NL 91.92.249.99:13359 tcp
US 8.8.8.8:53 93.65.42.20.in-addr.arpa udp

Files

memory/1864-0-0x000000007538E000-0x000000007538F000-memory.dmp

memory/1864-1-0x0000000000170000-0x000000000018E000-memory.dmp

memory/1864-2-0x0000000005170000-0x0000000005714000-memory.dmp

memory/1864-3-0x0000000005D40000-0x0000000006358000-memory.dmp

memory/1864-4-0x0000000004D60000-0x0000000004DF2000-memory.dmp

memory/1864-5-0x0000000004CF0000-0x0000000004D02000-memory.dmp

memory/1864-6-0x0000000004E00000-0x0000000004E3C000-memory.dmp

memory/1864-7-0x0000000005AC0000-0x0000000005B0C000-memory.dmp

memory/1864-8-0x0000000075380000-0x0000000075B30000-memory.dmp

memory/1864-9-0x0000000005870000-0x000000000597A000-memory.dmp

memory/1864-10-0x000000007538E000-0x000000007538F000-memory.dmp

memory/1864-11-0x0000000075380000-0x0000000075B30000-memory.dmp