Overview
overview
10Static
static
3482162548f...bf.exe
windows7-x64
10482162548f...bf.exe
windows10-2004-x64
10482162548f...bf.exe
android-9-x86
482162548f...bf.exe
android-10-x64
482162548f...bf.exe
android-11-x64
482162548f...bf.exe
macos-10.15-amd64
482162548f...bf.exe
ubuntu-18.04-amd64
482162548f...bf.exe
debian-9-armhf
482162548f...bf.exe
debian-9-mips
482162548f...bf.exe
debian-9-mipsel
Analysis
-
max time kernel
893s -
max time network
901s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 05:30
Static task
static1
Behavioral task
behavioral1
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral10
Sample
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
-
Size
1.3MB
-
MD5
d81f3f0e2284bb7751e6004c3835064a
-
SHA1
6afb6f15517b3d9b40a9fcf63943781dc7f89513
-
SHA256
482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf
-
SHA512
a7879b605654090c3e1bdac4e2c18ff098d0707cd056e05f5d9ab86aa1a8e309cc5f118f7e815787d4c701f87241fcf1a2eac37d90f99de234d9fd502a6926c5
-
SSDEEP
24576:3HtCx/lHI38bG/CogIvZD309jESvNoZh9JQVr8+VHjUhOGrgLWGiFSHz:sc8bG/Coo9jESIeV/jUqcFe
Malware Config
Extracted
redline
Pudt
176.111.174.254:56328
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2904-4-0x0000000000730000-0x0000000000750000-memory.dmp family_redline behavioral1/memory/2904-5-0x0000000000970000-0x000000000098E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2904-4-0x0000000000730000-0x0000000000750000-memory.dmp family_sectoprat behavioral1/memory/2904-5-0x0000000000970000-0x000000000098E000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exeC:\Users\Admin\AppData\Local\Temp\482162548f28d0ae3a695a27788b621510ea7375e2122383b7519358c20595bf.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2904