Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 17:20
Behavioral task
behavioral1
Sample
download2-word-exe.exe
Resource
win7-20241010-en
windows7-x64
8 signatures
150 seconds
General
-
Target
download2-word-exe.exe
-
Size
95KB
-
MD5
9a5b81e5bb91e87a6e289dd7d2945603
-
SHA1
0ce2f5aa6e306736d80752ef912f7d48c43f04ee
-
SHA256
bf5b34425d47de5b5adb0fcb0b34e01daa36999a1c8d66d422831ede5475bf8a
-
SHA512
914a2848c67f98d29e615817045a527edc8259107d67a6eff95848d10a7b1d421d15fed8094fddc1e12ebd611c695245cd6c070261b48d99c5ed269d1c5168b2
-
SSDEEP
1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2V3tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdpY
Malware Config
Extracted
Family
redline
Botnet
cheat
C2
24.152.39.79:63387
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1736-1-0x0000000001240000-0x000000000125E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/1736-1-0x0000000001240000-0x000000000125E000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download2-word-exe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1736 download2-word-exe.exe