Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-02-2025 23:07
Static task
static1
Behavioral task
behavioral1
Sample
1161b525009e7448837a658eecc04275.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1161b525009e7448837a658eecc04275.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
1161b525009e7448837a658eecc04275.exe
Resource
macos-20241101-en
General
-
Target
1161b525009e7448837a658eecc04275.exe
-
Size
576KB
-
MD5
1161b525009e7448837a658eecc04275
-
SHA1
2cad4c2f589760f6ae6830acb122a9d5eb9c66de
-
SHA256
7b9c9e71110c3980f1803a7438f507eadea9b078e59a61d551e21e1cae8ad5e5
-
SHA512
c85c524a09fc182b3472405b22372c2d6350b2df199d21805980d26215fc5ad075c41b5fdf371c3ddc85e5930e745426f21f0c7d50aa8c7114b2d3fb9451d034
-
SSDEEP
12288:9xgmj7oTFHFO1ZhzfQiCwxRyOTBfdgZUxX18:75oTFHU1H5CwxRyu/xl
Malware Config
Extracted
redline
cheat
185.222.58.44:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2608-16-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2608-12-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2608-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2608-20-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2608-18-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2608-16-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2608-12-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2608-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2608-20-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2608-18-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1161b525009e7448837a658eecc04275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2860 1161b525009e7448837a658eecc04275.exe 2860 1161b525009e7448837a658eecc04275.exe 2608 RegSvcs.exe 2608 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2860 1161b525009e7448837a658eecc04275.exe Token: SeDebugPrivilege 2608 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31 PID 2860 wrote to memory of 2608 2860 1161b525009e7448837a658eecc04275.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1161b525009e7448837a658eecc04275.exe"C:\Users\Admin\AppData\Local\Temp\1161b525009e7448837a658eecc04275.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD56093b9b9effe107a1958b5e8775d196a
SHA1f86ede48007734aebe75f41954ea1ef64924b05e
SHA256a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0
SHA5122d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77