Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2024 05:18

General

  • Target

    1620-2-0x00000000004A0000-0x00000000004C2000-memory.exe

  • Size

    136KB

  • MD5

    00bda418308d8253ff6356ea6e2fed07

  • SHA1

    fedc847312da30002179c1c8e32f81851dba36cd

  • SHA256

    0d75f0e3784a1de839986484772c66b623d763ca8a38dee480cbfefbb6245219

  • SHA512

    ecf485eaa149e1ca5c413b2357fd9a8b9cab3b5831cdc07b82406a9a4bc72dc3a2e759a0f381ab6dabd7ed2d3baeec8f8ad00d4b556ca314ef8780ae3cf3ff6e

  • SSDEEP

    1536:kG6qTaoigHed/g8pT0NM0MTn3qIzDmYw4o8WDLVi8nJZcI3DvvjbuVGdynvryp/P:B3epgGb3q+DmYwXVi4wIzDynzyJdDrd

Malware Config

Extracted

Family

redline

C2

141.94.188.138:46419

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1620-2-0x00000000004A0000-0x00000000004C2000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1620-2-0x00000000004A0000-0x00000000004C2000-memory.exe"
    1⤵
      PID:2268

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2268-0-0x0000000074FDE000-0x0000000074FDF000-memory.dmp

      Filesize

      4KB

    • memory/2268-1-0x0000000000170000-0x0000000000192000-memory.dmp

      Filesize

      136KB

    • memory/2268-2-0x00000000050A0000-0x00000000056B8000-memory.dmp

      Filesize

      6.1MB

    • memory/2268-3-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/2268-4-0x0000000004C70000-0x0000000004D7A000-memory.dmp

      Filesize

      1.0MB

    • memory/2268-5-0x0000000004BA0000-0x0000000004BDC000-memory.dmp

      Filesize

      240KB

    • memory/2268-6-0x0000000074FD0000-0x0000000075780000-memory.dmp

      Filesize

      7.7MB

    • memory/2268-7-0x0000000004BE0000-0x0000000004C2C000-memory.dmp

      Filesize

      304KB

    • memory/2268-8-0x0000000074FDE000-0x0000000074FDF000-memory.dmp

      Filesize

      4KB

    • memory/2268-9-0x0000000074FD0000-0x0000000075780000-memory.dmp

      Filesize

      7.7MB