Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11-06-2024 13:04
Behavioral task
behavioral1
Sample
build.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240226-en
General
-
Target
build.exe
-
Size
95KB
-
MD5
0052303e0b12bfcefa288a2e16885c54
-
SHA1
30fd41e3f1a02f973a82a0dd015f2fe22c46c890
-
SHA256
96529d580d42e20b04c3b9ba532c97a476bf37cac3e89b40db6a3e8ab35e68d5
-
SHA512
7010f292682e27aacad3dd83c8368ddc444864d76ea76c5f8e33399249d3560c63f7f4bd56766b743307cd9f906d1d50ddb64a1d4ed2740be15fc77bdc61eda7
-
SSDEEP
1536:RqseEqJMlbG6jejoigIg43Ywzi0Zb78ivombfexv0ujXyyed21teulgS6pE:/Te0Yg+zi0ZbYe1g0ujyzdBE
Malware Config
Extracted
redline
@123
agreement-horse.gl.at.ply.gg:19537
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2412-1-0x0000000000030000-0x000000000004E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2412-1-0x0000000000030000-0x000000000004E000-memory.dmp family_sectoprat -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
build.exepid process 2412 build.exe 2412 build.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
build.exedescription pid process Token: SeDebugPrivilege 2412 build.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2412-0-0x0000000073B2E000-0x0000000073B2F000-memory.dmpFilesize
4KB
-
memory/2412-1-0x0000000000030000-0x000000000004E000-memory.dmpFilesize
120KB
-
memory/2412-2-0x0000000005030000-0x0000000005636000-memory.dmpFilesize
6.0MB
-
memory/2412-3-0x0000000004850000-0x0000000004862000-memory.dmpFilesize
72KB
-
memory/2412-4-0x00000000048B0000-0x00000000048EE000-memory.dmpFilesize
248KB
-
memory/2412-5-0x00000000048F0000-0x000000000493B000-memory.dmpFilesize
300KB
-
memory/2412-6-0x0000000073B20000-0x000000007420E000-memory.dmpFilesize
6.9MB
-
memory/2412-7-0x0000000004B60000-0x0000000004C6A000-memory.dmpFilesize
1.0MB
-
memory/2412-8-0x0000000005D10000-0x0000000005ED2000-memory.dmpFilesize
1.8MB
-
memory/2412-9-0x0000000006410000-0x000000000693C000-memory.dmpFilesize
5.2MB
-
memory/2412-10-0x0000000005F50000-0x0000000005FB6000-memory.dmpFilesize
408KB
-
memory/2412-11-0x0000000006E40000-0x000000000733E000-memory.dmpFilesize
5.0MB
-
memory/2412-12-0x00000000062D0000-0x0000000006346000-memory.dmpFilesize
472KB
-
memory/2412-13-0x00000000069E0000-0x0000000006A72000-memory.dmpFilesize
584KB
-
memory/2412-14-0x0000000006940000-0x000000000695E000-memory.dmpFilesize
120KB
-
memory/2412-48-0x0000000073B2E000-0x0000000073B2F000-memory.dmpFilesize
4KB
-
memory/2412-49-0x0000000073B20000-0x000000007420E000-memory.dmpFilesize
6.9MB
-
memory/2412-51-0x0000000073B20000-0x000000007420E000-memory.dmpFilesize
6.9MB