Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 22:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
setup.exe
-
Size
411KB
-
MD5
1b898df684811054d405e9c31fddd80a
-
SHA1
9a322fd8e07427ce716f0dd9210ff563091e32de
-
SHA256
7386925178799b6b5a78e550ab756eedb61bb62adc8db66623f4a60dff30fe92
-
SHA512
c154faa686a30957718af46ab2150b1241d783025505b53adac9667af7e9d45ed4f08f22ffc6c45d0c9c47f070f427c5467600839aa94a3718719b7ec80e9be5
-
SSDEEP
6144:ir2uImjz71CmoNwemgkFfsQzGtvSiFsbHTYTS2wvp8GIUnl2:+Wmf7poNweTkFkQzkvSrDWS2wvp8enk
Score
10/10
Malware Config
Extracted
Family
redline
C2
141.94.188.138:46419
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5052-2-0x0000000005800000-0x0000000005822000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5052-2-0x0000000005800000-0x0000000005822000-memory.dmp family_sectoprat
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵PID:5052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4012,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=2856 /prefetch:81⤵PID:1660