Behavioral task
behavioral1
Sample
21e4c68118505da33246b093c06fed75cc049c785db86ef79950fff50c206f59.exe
Resource
win7-20240903-en
General
-
Target
f0c6f971c7f14c03d37f035434567fb5.bin
-
Size
43KB
-
MD5
a9c0ebcce3e7ef32a69593c35480d922
-
SHA1
e93a91278740f8b0f21fd23015f0dce8553bed24
-
SHA256
1b63fbc4851c8ecd70f7311f0e7b91b96f07b54ffdaa7a6a83ec0ddb15356b96
-
SHA512
5d6cd8302bb30996faf0701f59fd4a456cd23cfa529a7205bcd40f87e85c57c8a05c13a1700574f14f4f84b6066b4655757bc5c353ccbad6351a3c916970a044
-
SSDEEP
768:VZuvRfJGYsPxNQ9kaxTlC+9ed32FrrmrX/zB7wq135sh5Rj0SBzu+x/:iJxGY+NbaxTwR32Fvevz9wqIYSBzp
Malware Config
Extracted
redline
cheat
154.91.34.250:14555
Signatures
-
RedLine payload 1 IoCs
resource yara_rule static1/unpack001/21e4c68118505da33246b093c06fed75cc049c785db86ef79950fff50c206f59.exe family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule static1/unpack001/21e4c68118505da33246b093c06fed75cc049c785db86ef79950fff50c206f59.exe family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/21e4c68118505da33246b093c06fed75cc049c785db86ef79950fff50c206f59.exe
Files
-
f0c6f971c7f14c03d37f035434567fb5.bin.zip
Password: infected
-
21e4c68118505da33246b093c06fed75cc049c785db86ef79950fff50c206f59.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ