Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2024, 16:41 UTC

General

  • Target

    4153363158f713a02e405d251823c0c3.exe

  • Size

    577KB

  • MD5

    4153363158f713a02e405d251823c0c3

  • SHA1

    35168f14fa36d3f8d15614cb25a78415015691d1

  • SHA256

    a040d59da6528f88ded3b130199a23f33f01e9b049b89c0cceaabc5c6984bb26

  • SHA512

    c0bfbb1f13aa7e494369684d74f76deff4390d4910bcabe7bee75caef0eed8a813ef6ea73442cfdb86b6cc0b6a29222d5fcd67a6ed6742eb6eee92c58c83255f

  • SSDEEP

    12288:Om0+u3F55OHTDPJg6i6XGoVnpVn9SIRlwXkMWqsHG6xSd6Ys+tA2Zc:O5FXOPhi6hVn3c0wXkB6IS03+R

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.250:55615

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4153363158f713a02e405d251823c0c3.exe
    "C:\Users\Admin\AppData\Local\Temp\4153363158f713a02e405d251823c0c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\4153363158f713a02e405d251823c0c3.exe
      "C:\Users\Admin\AppData\Local\Temp\4153363158f713a02e405d251823c0c3.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4804

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    0.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-nl
    POST
    http://45.137.22.250:55615/
    4153363158f713a02e405d251823c0c3.exe
    Remote address:
    45.137.22.250:55615
    Request
    POST / HTTP/1.1
    Content-Type: text/xml; charset=utf-8
    SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
    Host: 45.137.22.250:55615
    Content-Length: 137
    Expect: 100-continue
    Accept-Encoding: gzip, deflate
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Content-Length: 212
    Content-Type: text/xml; charset=utf-8
    Server: Microsoft-HTTPAPI/2.0
    Date: Thu, 26 Dec 2024 16:41:26 GMT
  • flag-nl
    POST
    http://45.137.22.250:55615/
    4153363158f713a02e405d251823c0c3.exe
    Remote address:
    45.137.22.250:55615
    Request
    POST / HTTP/1.1
    Content-Type: text/xml; charset=utf-8
    SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
    Host: 45.137.22.250:55615
    Content-Length: 144
    Expect: 100-continue
    Accept-Encoding: gzip, deflate
    Response
    HTTP/1.1 200 OK
    Content-Length: 9976
    Content-Type: text/xml; charset=utf-8
    Server: Microsoft-HTTPAPI/2.0
    Date: Thu, 26 Dec 2024 16:41:32 GMT
  • flag-nl
    POST
    http://45.137.22.250:55615/
    4153363158f713a02e405d251823c0c3.exe
    Remote address:
    45.137.22.250:55615
    Request
    POST / HTTP/1.1
    Content-Type: text/xml; charset=utf-8
    SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
    Host: 45.137.22.250:55615
    Content-Length: 4300453
    Expect: 100-continue
    Accept-Encoding: gzip, deflate
    Response
    HTTP/1.1 200 OK
    Content-Length: 147
    Content-Type: text/xml; charset=utf-8
    Server: Microsoft-HTTPAPI/2.0
    Date: Thu, 26 Dec 2024 16:41:36 GMT
  • flag-nl
    POST
    http://45.137.22.250:55615/
    4153363158f713a02e405d251823c0c3.exe
    Remote address:
    45.137.22.250:55615
    Request
    POST / HTTP/1.1
    Content-Type: text/xml; charset=utf-8
    SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
    Host: 45.137.22.250:55615
    Content-Length: 4300445
    Expect: 100-continue
    Accept-Encoding: gzip, deflate
    Response
    HTTP/1.1 200 OK
    Content-Length: 261
    Content-Type: text/xml; charset=utf-8
    Server: Microsoft-HTTPAPI/2.0
    Date: Thu, 26 Dec 2024 16:41:38 GMT
  • flag-us
    DNS
    250.22.137.45.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    250.22.137.45.in-addr.arpa
    IN PTR
    Response
    250.22.137.45.in-addr.arpa
    IN PTR
    customer-rental rootlayernet
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    api.ip.sb
    4153363158f713a02e405d251823c0c3.exe
    Remote address:
    8.8.8.8:53
    Request
    api.ip.sb
    IN A
    Response
    api.ip.sb
    IN CNAME
    api.ip.sb.cdn.cloudflare.net
    api.ip.sb.cdn.cloudflare.net
    IN A
    104.26.13.31
    api.ip.sb.cdn.cloudflare.net
    IN A
    172.67.75.172
    api.ip.sb.cdn.cloudflare.net
    IN A
    104.26.12.31
  • flag-us
    GET
    https://api.ip.sb/geoip
    4153363158f713a02e405d251823c0c3.exe
    Remote address:
    104.26.13.31:443
    Request
    GET /geoip HTTP/1.1
    Host: api.ip.sb
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Thu, 26 Dec 2024 16:41:32 GMT
    Content-Type: application/json; charset=utf-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    vary: Accept-Encoding
    Cache-Control: no-cache
    access-control-allow-origin: *
    CF-Cache-Status: DYNAMIC
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GKBXO4%2FYPtCzfJZIC9ur0mebgFKHavg6dc7pX1SLItymwelA7lKkGpnnwFFrRjK%2Bi0Z44%2B3%2BBrA4MLEEJhg9KRkxTu4JUHvV%2BEvVfTXV4Jkt1sjqA%2BSM%2FBtWyw%3D%3D"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
    Server: cloudflare
    CF-RAY: 8f8284da8f40955c-LHR
    alt-svc: h3=":443"; ma=86400
    server-timing: cfL4;desc="?proto=TCP&rtt=57926&min_rtt=44522&rtt_var=19893&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2966&recv_bytes=357&delivery_rate=60958&cwnd=240&unsent_bytes=0&cid=7f8fe2bbdc3f0c95&ts=181&x=0"
  • flag-us
    DNS
    31.13.26.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.13.26.104.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    85.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    85.49.80.91.in-addr.arpa
    IN PTR
    Response
  • 45.137.22.250:55615
    http://45.137.22.250:55615/
    http
    4153363158f713a02e405d251823c0c3.exe
    9.0MB
    108.2kB
    6439
    2241

    HTTP Request

    POST http://45.137.22.250:55615/

    HTTP Response

    200

    HTTP Request

    POST http://45.137.22.250:55615/

    HTTP Response

    200

    HTTP Request

    POST http://45.137.22.250:55615/

    HTTP Response

    200

    HTTP Request

    POST http://45.137.22.250:55615/

    HTTP Response

    200
  • 104.26.13.31:443
    https://api.ip.sb/geoip
    tls, http
    4153363158f713a02e405d251823c0c3.exe
    713 B
    4.7kB
    8
    8

    HTTP Request

    GET https://api.ip.sb/geoip

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    0.159.190.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    0.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    250.22.137.45.in-addr.arpa
    dns
    72 B
    115 B
    1
    1

    DNS Request

    250.22.137.45.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    api.ip.sb
    dns
    4153363158f713a02e405d251823c0c3.exe
    55 B
    145 B
    1
    1

    DNS Request

    api.ip.sb

    DNS Response

    104.26.13.31
    172.67.75.172
    104.26.12.31

  • 8.8.8.8:53
    31.13.26.104.in-addr.arpa
    dns
    71 B
    133 B
    1
    1

    DNS Request

    31.13.26.104.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    85.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    85.49.80.91.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4153363158f713a02e405d251823c0c3.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Temp\tmp69.tmp

    Filesize

    40KB

    MD5

    a182561a527f929489bf4b8f74f65cd7

    SHA1

    8cd6866594759711ea1836e86a5b7ca64ee8911f

    SHA256

    42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

    SHA512

    9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

  • C:\Users\Admin\AppData\Local\Temp\tmp7F.tmp

    Filesize

    114KB

    MD5

    0163d73ac6c04817a0bed83c3564b99f

    SHA1

    784001e8d0e7ab6a09202c2a1094f371f7d017cb

    SHA256

    5114af822abc2b0f2aabb7565919164c9babf884e34c21095213dbe6a71511ea

    SHA512

    47051ee935be9e9d4457447c7fe5df06a5b0c5ef55d2c757d3dfa179b6049ae79732b1552e812febe5ae41a076cb29d8a809ae9b168afc7eb4c9eadfadcf5d9b

  • C:\Users\Admin\AppData\Local\Temp\tmp9B.tmp

    Filesize

    48KB

    MD5

    349e6eb110e34a08924d92f6b334801d

    SHA1

    bdfb289daff51890cc71697b6322aa4b35ec9169

    SHA256

    c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

    SHA512

    2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

  • C:\Users\Admin\AppData\Local\Temp\tmpC0.tmp

    Filesize

    20KB

    MD5

    49693267e0adbcd119f9f5e02adf3a80

    SHA1

    3ba3d7f89b8ad195ca82c92737e960e1f2b349df

    SHA256

    d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

    SHA512

    b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

  • C:\Users\Admin\AppData\Local\Temp\tmpC6.tmp

    Filesize

    116KB

    MD5

    f70aa3fa04f0536280f872ad17973c3d

    SHA1

    50a7b889329a92de1b272d0ecf5fce87395d3123

    SHA256

    8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

    SHA512

    30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

  • C:\Users\Admin\AppData\Local\Temp\tmpF1.tmp

    Filesize

    96KB

    MD5

    40f3eb83cc9d4cdb0ad82bd5ff2fb824

    SHA1

    d6582ba879235049134fa9a351ca8f0f785d8835

    SHA256

    cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

    SHA512

    cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

  • memory/1788-8-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/1788-6-0x0000000005660000-0x0000000005678000-memory.dmp

    Filesize

    96KB

  • memory/1788-9-0x0000000007D00000-0x0000000007D62000-memory.dmp

    Filesize

    392KB

  • memory/1788-10-0x000000000A4E0000-0x000000000A57C000-memory.dmp

    Filesize

    624KB

  • memory/1788-1-0x00000000007A0000-0x0000000000836000-memory.dmp

    Filesize

    600KB

  • memory/1788-7-0x00000000749CE000-0x00000000749CF000-memory.dmp

    Filesize

    4KB

  • memory/1788-14-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/1788-0-0x00000000749CE000-0x00000000749CF000-memory.dmp

    Filesize

    4KB

  • memory/1788-2-0x00000000056D0000-0x0000000005C74000-memory.dmp

    Filesize

    5.6MB

  • memory/1788-3-0x0000000005200000-0x0000000005292000-memory.dmp

    Filesize

    584KB

  • memory/1788-4-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/1788-5-0x00000000053C0000-0x00000000053CA000-memory.dmp

    Filesize

    40KB

  • memory/4804-15-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4804-17-0x0000000005630000-0x0000000005642000-memory.dmp

    Filesize

    72KB

  • memory/4804-22-0x0000000006C10000-0x0000000006DD2000-memory.dmp

    Filesize

    1.8MB

  • memory/4804-23-0x0000000007310000-0x000000000783C000-memory.dmp

    Filesize

    5.2MB

  • memory/4804-19-0x00000000056D0000-0x000000000571C000-memory.dmp

    Filesize

    304KB

  • memory/4804-20-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4804-18-0x0000000005690000-0x00000000056CC000-memory.dmp

    Filesize

    240KB

  • memory/4804-21-0x0000000005930000-0x0000000005A3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4804-16-0x0000000005BA0000-0x00000000061B8000-memory.dmp

    Filesize

    6.1MB

  • memory/4804-11-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4804-178-0x0000000006DE0000-0x0000000006E46000-memory.dmp

    Filesize

    408KB

  • memory/4804-179-0x00000000071B0000-0x0000000007226000-memory.dmp

    Filesize

    472KB

  • memory/4804-180-0x0000000007870000-0x000000000788E000-memory.dmp

    Filesize

    120KB

  • memory/4804-208-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4804-209-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4804-210-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.