Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 04:02

General

  • Target

    011ce3f456abbb1c932c8000b33da0037d9e7014d0077b6d7e1dab6512cd9fc0.exe

  • Size

    405KB

  • MD5

    fbb86cabd07bc0e38b8b2d7295e01b33

  • SHA1

    9e38c05dad3758e86c7231ad17ba1d5f290f1c4c

  • SHA256

    011ce3f456abbb1c932c8000b33da0037d9e7014d0077b6d7e1dab6512cd9fc0

  • SHA512

    887dff71f97059478d95ed0201b0f61f9093f06f5d40b37cd5ba053ec81402b722192595fec78f19a1daeeab5f2d4c0dbd97e2c17ae284d59c2645cbcca88ac4

  • SSDEEP

    6144:RF60FrgU35YuXFJKb4gOFHYO5aHohQX6gBN5VBrYIBMHebg:RFDmMXPKb4xD5aHGQX665XrYIe

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\011ce3f456abbb1c932c8000b33da0037d9e7014d0077b6d7e1dab6512cd9fc0.exe
    "C:\Users\Admin\AppData\Local\Temp\011ce3f456abbb1c932c8000b33da0037d9e7014d0077b6d7e1dab6512cd9fc0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/452-1-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

    Filesize

    1024KB

  • memory/452-2-0x0000000004B20000-0x0000000004B50000-memory.dmp

    Filesize

    192KB

  • memory/452-3-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/452-4-0x0000000004CD0000-0x0000000004CF4000-memory.dmp

    Filesize

    144KB

  • memory/452-5-0x0000000007500000-0x0000000007AA4000-memory.dmp

    Filesize

    5.6MB

  • memory/452-6-0x0000000007490000-0x00000000074B2000-memory.dmp

    Filesize

    136KB

  • memory/452-7-0x0000000000400000-0x0000000002DBD000-memory.dmp

    Filesize

    41.7MB

  • memory/452-8-0x0000000007AB0000-0x00000000080C8000-memory.dmp

    Filesize

    6.1MB

  • memory/452-9-0x0000000008120000-0x0000000008132000-memory.dmp

    Filesize

    72KB

  • memory/452-10-0x0000000008140000-0x000000000824A000-memory.dmp

    Filesize

    1.0MB

  • memory/452-11-0x0000000008250000-0x000000000828C000-memory.dmp

    Filesize

    240KB

  • memory/452-12-0x00000000082D0000-0x000000000831C000-memory.dmp

    Filesize

    304KB

  • memory/452-13-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

    Filesize

    1024KB

  • memory/452-14-0x0000000004B20000-0x0000000004B50000-memory.dmp

    Filesize

    192KB

  • memory/452-16-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB