Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exe
Resource
win10v2004-20241007-en
General
-
Target
dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exe
-
Size
265KB
-
MD5
30c732044ea09f221be9b1d176057cd4
-
SHA1
a020eb13eadac958d76c7713efb8143cf35730cf
-
SHA256
dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864
-
SHA512
7ab3cd92c8a6d98aff85c96b1c72bb7c7215fef4fe4e3dc2d92a273ec9385d4316e1fbc440bc3d48c3bc517d0412e72dbeeda42f9555df3eea4d063b6dfb37bc
-
SSDEEP
6144:8vnLYKUnDb9odH76WfQvw8GHrrRgng+z0xJg:8vnEHnVodmrAHRLg0Y
Malware Config
Extracted
redline
installbot_mix2
185.118.165.94:15838
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4496-4-0x0000000004B00000-0x0000000004B22000-memory.dmp family_redline behavioral2/memory/4496-6-0x0000000007360000-0x0000000007380000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4496-4-0x0000000004B00000-0x0000000004B22000-memory.dmp family_sectoprat behavioral2/memory/4496-6-0x0000000007360000-0x0000000007380000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exedescription pid process Token: SeDebugPrivilege 4496 dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exe"C:\Users\Admin\AppData\Local\Temp\dafd344406f9e3a55938dcb584834b2b103a4550d571559071ece00811796864.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4496