Analysis

  • max time kernel
    147s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 23:55

General

  • Target

    119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe

  • Size

    2.4MB

  • MD5

    d4bfc09f4e75c9eef1ead04768aaabc9

  • SHA1

    7b9fe73a44da7b5b7b1c8743b8227e07723c8175

  • SHA256

    119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c

  • SHA512

    345a4248cedf541acb667925893db6d3660102ee9e5df9086d69cd03719e038f3f7fae01f1b7a21235a7b57ad2aa49c0d044db793eb2ac9a509e9f355d2a81a6

  • SSDEEP

    24576:WNisxv4HA62oNMBzF0MkcFRGP4/G/iE/K3LI7DE3Q1V+Z02cyxxGj:CisqNAz2sGPYspK393bZ02cyx6

Malware Config

Extracted

Family

redline

Botnet

build4

C2

45.139.236.36:33611

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
    "C:\Users\Admin\AppData\Local\Temp\119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
      "C:\Users\Admin\AppData\Local\Temp\119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe.log

    Filesize

    1KB

    MD5

    e7473990edf901c1e1bef76f6095f55b

    SHA1

    f03b370492bbcc5280982886f9688eb8da762c8f

    SHA256

    5fea4747d97c0dbc097902818ae754eaca7214913a52d3bb1372a6274ce0292a

    SHA512

    ab93f14371dfae858bbad7d98c95055186f60b30937057f71b3d1ad17ab08b5ab7820a33bc5b3e74c485ec38e6b7a1772077add591d313175c10b4ff94bcb689

  • memory/4136-13-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4136-25-0x0000000074F80000-0x0000000075730000-memory.dmp

    Filesize

    7.7MB

  • memory/4136-24-0x0000000074F80000-0x0000000075730000-memory.dmp

    Filesize

    7.7MB

  • memory/4136-23-0x00000000056B0000-0x00000000057BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4136-22-0x0000000005450000-0x000000000549C000-memory.dmp

    Filesize

    304KB

  • memory/4136-21-0x0000000005410000-0x000000000544C000-memory.dmp

    Filesize

    240KB

  • memory/4136-20-0x00000000053B0000-0x00000000053C2000-memory.dmp

    Filesize

    72KB

  • memory/4136-19-0x0000000005AD0000-0x00000000060E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4136-18-0x0000000074F80000-0x0000000075730000-memory.dmp

    Filesize

    7.7MB

  • memory/4136-16-0x0000000074F80000-0x0000000075730000-memory.dmp

    Filesize

    7.7MB

  • memory/4432-6-0x0000000074F80000-0x0000000075730000-memory.dmp

    Filesize

    7.7MB

  • memory/4432-7-0x0000000005580000-0x00000000055D6000-memory.dmp

    Filesize

    344KB

  • memory/4432-11-0x00000000061A0000-0x000000000621E000-memory.dmp

    Filesize

    504KB

  • memory/4432-10-0x0000000074F80000-0x0000000075730000-memory.dmp

    Filesize

    7.7MB

  • memory/4432-9-0x0000000074F8E000-0x0000000074F8F000-memory.dmp

    Filesize

    4KB

  • memory/4432-17-0x0000000074F80000-0x0000000075730000-memory.dmp

    Filesize

    7.7MB

  • memory/4432-8-0x0000000005770000-0x000000000578A000-memory.dmp

    Filesize

    104KB

  • memory/4432-12-0x0000000008710000-0x0000000008746000-memory.dmp

    Filesize

    216KB

  • memory/4432-0-0x0000000074F8E000-0x0000000074F8F000-memory.dmp

    Filesize

    4KB

  • memory/4432-5-0x0000000005450000-0x000000000545A000-memory.dmp

    Filesize

    40KB

  • memory/4432-4-0x00000000054E0000-0x0000000005572000-memory.dmp

    Filesize

    584KB

  • memory/4432-3-0x00000000059F0000-0x0000000005F94000-memory.dmp

    Filesize

    5.6MB

  • memory/4432-2-0x00000000053A0000-0x000000000543C000-memory.dmp

    Filesize

    624KB

  • memory/4432-1-0x0000000000730000-0x00000000009A6000-memory.dmp

    Filesize

    2.5MB