Analysis

  • max time kernel
    158s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    19-03-2022 11:42

General

  • Target

    ece78097b518756e973a2183e2c5075f1c1133b6abaf1d34b5dec39a6285f358.exe

  • Size

    1.7MB

  • MD5

    8ad1d303eb8cd37ccd68916bb007cc8a

  • SHA1

    db4f8e16d7c1fa6c9a2aa92bb8be72e7bd7db000

  • SHA256

    ece78097b518756e973a2183e2c5075f1c1133b6abaf1d34b5dec39a6285f358

  • SHA512

    dd6affd15b225886e9abf0d1d03978c0b8d856a387992cdce293a7b3d521574fd792b6321740e0c3b499fcacb6d0d67d33b1b46044b0a3e3b036d86de8f98e60

Malware Config

Extracted

Family

sendsafe

Botnet

UNREGISTERED

C2

195.2.240.119:50099

195.2.240.119:50100

Attributes
  • service_name

    Enterprise Mailing Service

Signatures

  • SendSafe

    SendSafe is a notorious spam tool which then turned into spam botnet.

  • SendSafe Payload 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ece78097b518756e973a2183e2c5075f1c1133b6abaf1d34b5dec39a6285f358.exe
    "C:\Users\Admin\AppData\Local\Temp\ece78097b518756e973a2183e2c5075f1c1133b6abaf1d34b5dec39a6285f358.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-134-0x0000000002470000-0x0000000002622000-memory.dmp
    Filesize

    1.7MB

  • memory/1040-135-0x0000000000400000-0x00000000005C9000-memory.dmp
    Filesize

    1.8MB