Overview
overview
10Static
static
10app.exe
windows7-x64
10app.exe
windows10-2004-x64
10arnatic_2.exe
windows7-x64
10arnatic_2.exe
windows10-2004-x64
10arnatic_3.exe
windows7-x64
10arnatic_3.exe
windows10-2004-x64
7arnatic_4.exe
windows7-x64
9arnatic_4.exe
windows10-2004-x64
9arnatic_5.exe
windows7-x64
10arnatic_5.exe
windows10-2004-x64
10arnatic_6.exe
windows7-x64
10arnatic_6.exe
windows10-2004-x64
10arnatic_7.exe
windows7-x64
10arnatic_7.exe
windows10-2004-x64
10null.exe
windows7-x64
10null.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:34
Behavioral task
behavioral1
Sample
app.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
app.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
arnatic_2.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
arnatic_2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
arnatic_3.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
arnatic_3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
arnatic_4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
arnatic_4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
arnatic_5.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
arnatic_5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
arnatic_6.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
arnatic_6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
arnatic_7.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
arnatic_7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
null.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
null.exe
Resource
win10v2004-20241007-en
General
-
Target
arnatic_7.exe
-
Size
397KB
-
MD5
fe5c49e95574a208cdcd0cbbd38d4e04
-
SHA1
c79e4a68e3499f66d6ed628911aed4868ce362ea
-
SHA256
14cb2597414f705abc44a0c54322f995d4ac54b75b50daf64dc3b61895c9f6ea
-
SHA512
cfbb2e8b3cf7fe2729ec3189ed18379251a8ed0b9803f3290bfe11be149331b79ec063eb4b506ee18b00d363c2b4b58b6c5d979ee8f03f9277735b5f5fab91a7
-
SSDEEP
6144:RgG2QIaoviJXS4tkOGhK85JOMnfJ/z1ZLdQKFKRsoVyhcdKriC:x2QfoviJC4t0K850MfJ/z1rQKFKNtdl
Malware Config
Extracted
redline
Cana
176.111.174.254:56328
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral14/memory/4324-5-0x0000000002B00000-0x0000000002B20000-memory.dmp family_redline behavioral14/memory/4324-7-0x0000000002C90000-0x0000000002CAE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral14/memory/4324-5-0x0000000002B00000-0x0000000002B20000-memory.dmp family_sectoprat behavioral14/memory/4324-7-0x0000000002C90000-0x0000000002CAE000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arnatic_7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4324 arnatic_7.exe