Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe
Resource
win10v2004-20241007-en
General
-
Target
8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe
-
Size
1.2MB
-
MD5
7561d69fdc62a8a8647f7c33d4413ee4
-
SHA1
e28b5cbfc7f41e998fab1b1d33b419cfd7f85d64
-
SHA256
8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0
-
SHA512
93b4606197a9e76ae73f1eebbc38c0dede308d29f7d8b4228f86546ea59223fe395718fe52059af1299dfa353d9dfb0f456489d8d6c502d70be98b062149f7df
-
SSDEEP
24576:I1DT7B3uSHk1C5P9ILvWJ3oTJwP85+2HEPR/ekRn1RY5:I1/7BxwC99a03v8+2HEp/1n12
Malware Config
Extracted
redline
InvasionValorantHackV3.1
45.67.231.218:15411
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/1732-2-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-4-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-6-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-8-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-9-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-10-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-11-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-12-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-13-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-14-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-15-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-16-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-17-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-18-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-19-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat behavioral1/memory/1732-20-0x00000000000B0000-0x0000000000452000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exepid process 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exepid process 1732 8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe"C:\Users\Admin\AppData\Local\Temp\8ef92577590803fac7d0c5b918e25f37b74b87bcf353806c6b2ed81ae4a584c0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1732