Analysis

  • max time kernel
    120s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 05:15

General

  • Target

    f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe

  • Size

    95KB

  • MD5

    390fc6c7c2b8f8d411f425a8e4ccac38

  • SHA1

    a61674f6ef386be9c89d42dc8c7fd50a2f775fb2

  • SHA256

    f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3

  • SHA512

    0c4fff1b0ebbedc63df667740151f5fee3dc0a5025cf9681f2915fc3667cfaa473cbd5ecbd4515dc9c28b8c2f8915c2e3cc0776031ee7e1ce58b64389854dc04

  • SSDEEP

    1536:FqsIhaqpalbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2otmulgS6pQl:DGaKaYP+zi0ZbYe1g0ujyzdMQ

Malware Config

Extracted

Family

redline

Botnet

20250129

C2

103.84.89.222:33791

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe
    "C:\Users\Admin\AppData\Local\Temp\f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpE4E5.tmp

    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmpE4FA.tmp

    Filesize

    92KB

    MD5

    0040f587d31c3c0be57da029997f9978

    SHA1

    d4729f8ed094797bd54ea8a9987aaa7058e7eaa2

    SHA256

    a285e3bc24d218869afd114c236f0aafebeba96d4105ddd379ae31f03b26079b

    SHA512

    3e4ffca2ff979b5f91a0c8d5d1fa52f0ab47ff63e50b1cc5e7708c4ba8359ee8505a9259f329da5733048e953f0778af73ce76735b481d558dd05a2cb45a5977

  • C:\Users\Admin\AppData\Local\Temp\tmpE57C.tmp

    Filesize

    13KB

    MD5

    c44425ec890626ffa136d74bf6fe11f3

    SHA1

    09e5cdf81713b541e6a7ce63308c0bbd4e8e18bb

    SHA256

    6b25f744f461b512c539c7aae5e601f8a7e0d46ef6315914c3cc9b62d45cc2c8

    SHA512

    b25227bcba4938c473724fbaf73cb10113e3208c435b60dbee13d0c080b1aa84fd529af83eea092eb796d7668570f99d03f8c6007e834935717e19e8cedcca47

  • C:\Users\Admin\AppData\Local\Temp\tmpE580.tmp

    Filesize

    341KB

    MD5

    35751e387cb16a3e1e21dae1d8c04bc3

    SHA1

    4232cc1e365bb5be70134a8a8774109c4e26f619

    SHA256

    944e65065c36c264937d2d21feeb9b92f0fbd3c0bfbd0fcb510c8d0c60905835

    SHA512

    8f2fc6eb1ae791842e44fb12029c1f8a3766746334fb32482c46f53fa5e588ba49f824bc6c7838671b883c58ecbfcb3e2b566fcf05d2ed1e4f189d0061a8a21a

  • C:\Users\Admin\AppData\Local\Temp\tmpE581.tmp

    Filesize

    17KB

    MD5

    a6459299d9444c1b9c3f7b545213f8c3

    SHA1

    7ef39e1758f652f399d53798861f607f030853fe

    SHA256

    5b464e6da43694f6da0ade7e014346e2cd279d2cb69d2d83c3d08eebceb73c12

    SHA512

    3857ad335f83b9b5e03e4a5bd8028c1d56b52a127e90f8c3a1bd104c5d1cf2a12e87e96603c5528c679d29f847fda498348c637cf521d2401f2ac0ac8b32f104

  • C:\Users\Admin\AppData\Local\Temp\tmpE582.tmp

    Filesize

    455KB

    MD5

    23ba92772f36c37555dacc5f3e0824cc

    SHA1

    0bbba5a57f4b7ba611f643004054b1f9a000fc45

    SHA256

    2e2e2b83dd9ad2fd13c00a2b2b706930ab237c30bb80be41fd3173827747fff0

    SHA512

    28bfb348f51167db37bd15cde3d4aa5c427f3b92743b68389825931649bf9f90fe6ab7e5cea6bb86f52a90b27b0ce46ee36b5f9b8596bec11a7140618b31b933

  • C:\Users\Admin\AppData\Local\Temp\tmpE603.tmp

    Filesize

    14KB

    MD5

    a1f2494de91b4fc11b8c2199f4d76801

    SHA1

    5385c617fcdbc09a1d5b9ee812627ac2a956637d

    SHA256

    ac6c5f48bb4f068ed04aee2926e4fbf71e2a80a30f99c420e0751797357bfdde

    SHA512

    20e622e6e419caa1e8b3fb097becd1ea2f868e0bcd40cead43af1852b7c1a26d18b3beb2f197667c38ae421c7b2f07e2327ee17d1df6fb64a2f11a972f822336

  • C:\Users\Admin\AppData\Local\Temp\tmpE604.tmp

    Filesize

    13KB

    MD5

    e73db420b5b964852d469beca4840f97

    SHA1

    1ca05cbe68a674e4ec274967390b5e4c1a4baebf

    SHA256

    c94362f4ab170edebe21f9baacb7f444ba5e85d6197b5dac995f72390ff3b657

    SHA512

    076e10714cb5de66a550d5ebaad40fc7524890539894333f68ce20d4bbdfe372bd644e22309667e31317cd5c309bb3dee1a247e5dd5fb80efc78b9a120aaaf91

  • C:\Users\Admin\AppData\Local\Temp\tmpE605.tmp

    Filesize

    18KB

    MD5

    5d3133747e7b8257a6682ecc0b197a71

    SHA1

    3015448d37026853c8c11a582a3dfb73feaf0313

    SHA256

    9f1cf2701f39743be3cbc4bd840f63cb8a1e87b8a8b83fb143b19fa3a2288e26

    SHA512

    8ee616e0190e8306fb52ff00e3cfc209537a6ca2847992bbcccfda8a0ed5902c06d4c9ed77c9625a2a39828d8e3071fd6bacbd241fae3edab19a869622599c7b

  • memory/1200-4-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB

  • memory/1200-3-0x00000000743BE000-0x00000000743BF000-memory.dmp

    Filesize

    4KB

  • memory/1200-2-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB

  • memory/1200-0-0x00000000743BE000-0x00000000743BF000-memory.dmp

    Filesize

    4KB

  • memory/1200-1-0x0000000000B80000-0x0000000000B9E000-memory.dmp

    Filesize

    120KB