Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 16:44
Static task
static1
General
-
Target
e4a200fc3da152d2b8c48f6e19b8ec97.exe
-
Size
787KB
-
MD5
e4a200fc3da152d2b8c48f6e19b8ec97
-
SHA1
6104b851cccad3628b12d4ca136b8f364bbd3d35
-
SHA256
95d29f64d0106c91070bcd511f78f6cf29d35cdb8cbbd97cfdfdcf61e422b4da
-
SHA512
d704391d9a566a889398af1d119e46aecfa9421802cb14785847a64d4848874f2b65aed132d955f624a848fead5b2cb48a9805c90d5df2e230064775f6f015ea
-
SSDEEP
6144:YMOuBuN9xo1rFJLgGu8BWsijyckMnCgstzX29Hr13PKLeifjdUQhNZ:YMOuBuN9xoS8BWHjVktgMOHh3PKyGf
Malware Config
Extracted
redline
cheat
172.31.9.183:29120
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3864-12-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/3864-12-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4a200fc3da152d2b8c48f6e19b8ec97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4a200fc3da152d2b8c48f6e19b8ec97.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3864 e4a200fc3da152d2b8c48f6e19b8ec97.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107 PID 1980 wrote to memory of 3864 1980 e4a200fc3da152d2b8c48f6e19b8ec97.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a200fc3da152d2b8c48f6e19b8ec97.exe"C:\Users\Admin\AppData\Local\Temp\e4a200fc3da152d2b8c48f6e19b8ec97.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\e4a200fc3da152d2b8c48f6e19b8ec97.exe"C:\Users\Admin\AppData\Local\Temp\e4a200fc3da152d2b8c48f6e19b8ec97.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e4a200fc3da152d2b8c48f6e19b8ec97.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3