Analysis
-
max time kernel
124s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 15:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe
-
Size
523KB
-
MD5
e336cd749eb4e599192906f8d61d0bb2
-
SHA1
6d431812efb3c52e0bdd44d2602bca486eacc451
-
SHA256
3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4
-
SHA512
8e18ce1501dbf77ca2af6cf6d7c0813501b2e94c61e859878370e872c93b79d7019430391b4916296e7f62079d2408a37ff0cdab0260d67b437eb88310d1fb84
-
SSDEEP
12288:5cO61A772/5RMH4Gj63oiwKeWq6GXiS+qdYYn86v:U+XQRMYGSFFq6G53nv
Malware Config
Extracted
Family
redline
Botnet
xxl
C2
2.56.59.101:17559
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2236-14-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2236-11-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2236-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2236-19-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2236-16-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2236-14-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2236-11-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2236-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2236-19-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2236-16-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 360 set thread context of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28 PID 360 wrote to memory of 2236 360 3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe"C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe"C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236
-