Analysis
-
max time kernel
53s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 19:19
Static task
static1
Behavioral task
behavioral1
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
win7-20241010-en
General
-
Target
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
-
Size
1.3MB
-
MD5
d81f3f0e2284bb7751e6004c3835064a
-
SHA1
6afb6f15517b3d9b40a9fcf63943781dc7f89513
-
SHA256
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf
-
SHA512
a7879b605654090c3e1bdac4e2c18ff098d0707cd056e05f5d9ab86aa1a8e309cc5f118f7e815787d4c701f87241fcf1a2eac37d90f99de234d9fd502a6926c5
-
SSDEEP
24576:3HtCx/lHI38bG/CogIvZD309jESvNoZh9JQVr8+VHjUhOGrgLWGiFSHz:sc8bG/Coo9jESIeV/jUqcFe
Malware Config
Extracted
redline
Pudt
176.111.174.254:56328
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2808-5-0x0000000000320000-0x0000000000340000-memory.dmp family_redline behavioral1/memory/2808-6-0x00000000021D0000-0x00000000021EE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2808-5-0x0000000000320000-0x0000000000340000-memory.dmp family_sectoprat behavioral1/memory/2808-6-0x00000000021D0000-0x00000000021EE000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe"C:\Users\Admin\AppData\Local\Temp\482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2808