Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:59

General

  • Target

    97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef.exe

  • Size

    352KB

  • MD5

    0daf9b1073d0a2da692cb55e20b9c06f

  • SHA1

    7229a26427693e509d4107fbdf3c6a2470bb0ef8

  • SHA256

    97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef

  • SHA512

    7608766021e8ea0889bb567e0feb580f872588b27338345fef317091fca9c5f60fc6c8005a6daa283ad3a7f9e602fb6cd5dd7e73aa638ec709f534c37fcff919

  • SSDEEP

    6144:rwSHBE23NKRgDsqY3vqZXaIAXFul6e2kuluWoqPG33fKvTjQhiomT0iMR:jHBE230RgDsqY3vqkbU6puWwSvTjQmT

Malware Config

Extracted

Family

redline

C2

185.215.113.29:8678

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef.exe
    "C:\Users\Admin\AppData\Local\Temp\97cb6f0c2fb4fd697b08da857a12f523bb592a5e8861ada9272ac761aab3d7ef.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-1-0x0000000002C90000-0x0000000002D90000-memory.dmp

    Filesize

    1024KB

  • memory/1084-2-0x00000000048B0000-0x00000000048E0000-memory.dmp

    Filesize

    192KB

  • memory/1084-3-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1084-4-0x00000000049F0000-0x0000000004A14000-memory.dmp

    Filesize

    144KB

  • memory/1084-5-0x0000000007490000-0x0000000007A34000-memory.dmp

    Filesize

    5.6MB

  • memory/1084-6-0x0000000004F10000-0x0000000004F32000-memory.dmp

    Filesize

    136KB

  • memory/1084-7-0x0000000000400000-0x0000000002B64000-memory.dmp

    Filesize

    39.4MB

  • memory/1084-8-0x0000000007A40000-0x0000000008058000-memory.dmp

    Filesize

    6.1MB

  • memory/1084-9-0x0000000007300000-0x0000000007312000-memory.dmp

    Filesize

    72KB

  • memory/1084-10-0x0000000007320000-0x000000000742A000-memory.dmp

    Filesize

    1.0MB

  • memory/1084-11-0x0000000007430000-0x000000000746C000-memory.dmp

    Filesize

    240KB

  • memory/1084-12-0x0000000008090000-0x00000000080DC000-memory.dmp

    Filesize

    304KB

  • memory/1084-13-0x0000000002C90000-0x0000000002D90000-memory.dmp

    Filesize

    1024KB

  • memory/1084-14-0x00000000048B0000-0x00000000048E0000-memory.dmp

    Filesize

    192KB

  • memory/1084-16-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB