Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
ocHcxXqIvZbjJ5SjBH0EkE2Y.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ocHcxXqIvZbjJ5SjBH0EkE2Y.exe
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
ocHcxXqIvZbjJ5SjBH0EkE2Y.exe
Resource
win10v2004-20240709-en
General
-
Target
ocHcxXqIvZbjJ5SjBH0EkE2Y.exe
-
Size
1.2MB
-
MD5
44c355ae8cc3ecc4a95b5716fb9635fd
-
SHA1
f4d46438cad6fac2be4fb08cf6972a8306e5e12a
-
SHA256
f77f16151eb30569f7f1276063f67100c6ad439fde9d07605c5ae5e0c9eb8b7d
-
SHA512
46ab10861ff330796bd7e60c71e474ebb7a44d2000eea9d56c4fcc27d6b1e1c643996c91d6261f107aa5b86b3bbaf38c23be4705a6fcc3a587bd9d7422c7f259
-
SSDEEP
12288:2kYE2r670sGqlvG2Hbt5wzdoLTgN/p48azOzPxiDOZ3IHSrsZn8NxNZLAdXeUif8:VmElvGuXeULC
Malware Config
Extracted
redline
1
37.0.8.88:44263
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2092-16-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral2/memory/2092-13-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral2/memory/2092-11-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral2/memory/2092-8-0x0000000000400000-0x0000000000448000-memory.dmp family_redline behavioral2/memory/2092-7-0x0000000000400000-0x0000000000448000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2092-16-0x0000000000400000-0x0000000000448000-memory.dmp family_sectoprat behavioral2/memory/2092-13-0x0000000000400000-0x0000000000448000-memory.dmp family_sectoprat behavioral2/memory/2092-11-0x0000000000400000-0x0000000000448000-memory.dmp family_sectoprat behavioral2/memory/2092-8-0x0000000000400000-0x0000000000448000-memory.dmp family_sectoprat behavioral2/memory/2092-7-0x0000000000400000-0x0000000000448000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ocHcxXqIvZbjJ5SjBH0EkE2Y.exedescription pid process target process PID 3008 set thread context of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ocHcxXqIvZbjJ5SjBH0EkE2Y.exedescription pid process target process PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe PID 3008 wrote to memory of 2092 3008 ocHcxXqIvZbjJ5SjBH0EkE2Y.exe ocHcxXqIvZbjJ5SjBH0EkE2Y.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ocHcxXqIvZbjJ5SjBH0EkE2Y.exe"C:\Users\Admin\AppData\Local\Temp\ocHcxXqIvZbjJ5SjBH0EkE2Y.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\ocHcxXqIvZbjJ5SjBH0EkE2Y.exeC:\Users\Admin\AppData\Local\Temp\ocHcxXqIvZbjJ5SjBH0EkE2Y.exe2⤵PID:2092