Analysis
-
max time kernel
131s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 10:59
Behavioral task
behavioral1
Sample
8042e30a34f07a606d6e8f3768f59d52133820a41794275481e3506b1e2d006f.exe
Resource
win7-20240705-en
General
-
Target
8042e30a34f07a606d6e8f3768f59d52133820a41794275481e3506b1e2d006f.exe
-
Size
95KB
-
MD5
0e4b0dd3ee5d91b69296e3887bde2d2d
-
SHA1
a040a44b9bb38de4b7399ae8856557e818aa68db
-
SHA256
8042e30a34f07a606d6e8f3768f59d52133820a41794275481e3506b1e2d006f
-
SHA512
499b22959ca1e170b2d45878e85b0c6265af390b297176503ab7cebf4b06d7137f98a3fc029be21d402d8e6959d98f90cbb36a77c42140ac91bfc592248c7266
-
SSDEEP
1536:5qsIbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2JtmulgS6p8l:XywiYj+zi0ZbYe1g0ujyzdp8
Malware Config
Extracted
redline
french
91.92.243.245:47477
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2136-1-0x00000000005B0000-0x00000000005CE000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2136-1-0x00000000005B0000-0x00000000005CE000-memory.dmp family_sectoprat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8042e30a34f07a606d6e8f3768f59d52133820a41794275481e3506b1e2d006f.exedescription pid process Token: SeDebugPrivilege 2136 8042e30a34f07a606d6e8f3768f59d52133820a41794275481e3506b1e2d006f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2136-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmpFilesize
4KB
-
memory/2136-1-0x00000000005B0000-0x00000000005CE000-memory.dmpFilesize
120KB
-
memory/2136-2-0x0000000005580000-0x0000000005B98000-memory.dmpFilesize
6.1MB
-
memory/2136-3-0x0000000004F80000-0x0000000004F92000-memory.dmpFilesize
72KB
-
memory/2136-4-0x0000000004FE0000-0x000000000501C000-memory.dmpFilesize
240KB
-
memory/2136-5-0x0000000005020000-0x000000000506C000-memory.dmpFilesize
304KB
-
memory/2136-6-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB
-
memory/2136-7-0x0000000005280000-0x000000000538A000-memory.dmpFilesize
1.0MB
-
memory/2136-8-0x0000000074E4E000-0x0000000074E4F000-memory.dmpFilesize
4KB
-
memory/2136-9-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB