Behavioral task
behavioral1
Sample
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
Resource
win10v2004-20240730-en
General
-
Target
7b46dadda1669480cf7efd536ac13b6836d19970a1037f81b5ed98bcc28f6c92
-
Size
43KB
-
MD5
6f6b2f4a751734703a23d360b0572c27
-
SHA1
e5d3242dc31eb8f3b0384ba98b377c9a605943db
-
SHA256
7b46dadda1669480cf7efd536ac13b6836d19970a1037f81b5ed98bcc28f6c92
-
SHA512
f373b87df1b807e650a8508eb687729747e50200c9685d13e8c4b142b46ea0bd5f830b5a8a25f997cd2e2c5f5f02820550cb18a9a3cc364bec27e73e64284061
-
SSDEEP
768:yDtveBeU2oP9hf0hqiaDfygLyVlv6Zb6Xj6x/pXtWAkin3/nt+exJeazmfJ:WRSxlqKKNf6hNtWAk63/nAaifJ
Malware Config
Extracted
redline
svchost
157.66.25.16:47818
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
Files
-
7b46dadda1669480cf7efd536ac13b6836d19970a1037f81b5ed98bcc28f6c92.zip
Password: infected
-
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ