Behavioral task
behavioral1
Sample
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0_payload.exe
Resource
win7-20240708-en
General
-
Target
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0_payload.exe
-
Size
95KB
-
MD5
517c949f1f22d780b8a2d4efb4ac92ac
-
SHA1
aff8a87b61eac55358ef51d5954f38a0edea1798
-
SHA256
fdf7c12f0a27c062abdc5d39b606c2253b393633183f88d546bf6678c4ef27dd
-
SHA512
8a12a3e09a4c0bfb4004244f0156a8b9fd865d7bc72841599a1a5154d50039e23c6039d5e507b05ecb313d04297db5106fc4d7fc41f7bef883b345eb4b358d5d
-
SSDEEP
1536:5qsCOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2YteulgS6p8l:X1uOYj+zi0ZbYe1g0ujyzd48
Malware Config
Extracted
redline
unk777
159.203.177.31:16383
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule sample family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0_payload.exe
Files
-
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0_payload.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ