Resubmissions
23-02-2025 20:32
250223-zbmdnsvqcz 1021-02-2025 23:07
250221-23yxwssrem 1021-02-2025 18:31
250221-w6dhgaxpbk 10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2025 20:32
Static task
static1
Behavioral task
behavioral1
Sample
1161b525009e7448837a658eecc04275.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1161b525009e7448837a658eecc04275.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
1161b525009e7448837a658eecc04275.exe
Resource
macos-20241101-en
General
-
Target
1161b525009e7448837a658eecc04275.exe
-
Size
576KB
-
MD5
1161b525009e7448837a658eecc04275
-
SHA1
2cad4c2f589760f6ae6830acb122a9d5eb9c66de
-
SHA256
7b9c9e71110c3980f1803a7438f507eadea9b078e59a61d551e21e1cae8ad5e5
-
SHA512
c85c524a09fc182b3472405b22372c2d6350b2df199d21805980d26215fc5ad075c41b5fdf371c3ddc85e5930e745426f21f0c7d50aa8c7114b2d3fb9451d034
-
SSDEEP
12288:9xgmj7oTFHFO1ZhzfQiCwxRyOTBfdgZUxX18:75oTFHU1H5CwxRyu/xl
Malware Config
Extracted
redline
cheat
185.222.58.44:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/988-11-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/988-11-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4572 set thread context of 988 4572 1161b525009e7448837a658eecc04275.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1161b525009e7448837a658eecc04275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4572 1161b525009e7448837a658eecc04275.exe 4572 1161b525009e7448837a658eecc04275.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4572 1161b525009e7448837a658eecc04275.exe Token: SeDebugPrivilege 988 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86 PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86 PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86 PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86 PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86 PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86 PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86 PID 4572 wrote to memory of 988 4572 1161b525009e7448837a658eecc04275.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1161b525009e7448837a658eecc04275.exe"C:\Users\Admin\AppData\Local\Temp\1161b525009e7448837a658eecc04275.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:988
-