Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    10-04-2022 20:36

General

  • Target

    11a1de15c0c962bcc926e64f372913d3.exe

  • Size

    344KB

  • MD5

    11a1de15c0c962bcc926e64f372913d3

  • SHA1

    3784a65a858770f0bb7f3916e86eea3b92b3f3d9

  • SHA256

    e4ea93daa9fb96ea8636097e42b10c2fc1caebc7411891f8aefb934baa24b786

  • SHA512

    8f3f3e52b134dd7a6cc855c2ef085478a77243fd81192557ab6d3bef2601e8555400eb0dabb2d1ced6c8fa8bd3887a321cde9cc8424784323e5dfa6bd7398429

Malware Config

Extracted

Family

redline

Botnet

50

C2

193.106.191.132:23196

Attributes
  • auth_value

    8735fcb130c82dd9d353478678d60bde

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\11a1de15c0c962bcc926e64f372913d3.exe
    "C:\Users\Admin\AppData\Local\Temp\11a1de15c0c962bcc926e64f372913d3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1556-54-0x000000000056A000-0x0000000000593000-memory.dmp

    Filesize

    164KB

  • memory/1556-55-0x0000000000780000-0x00000000007B0000-memory.dmp

    Filesize

    192KB

  • memory/1556-56-0x0000000002150000-0x000000000217E000-memory.dmp

    Filesize

    184KB

  • memory/1556-57-0x000000000056A000-0x0000000000593000-memory.dmp

    Filesize

    164KB

  • memory/1556-58-0x0000000000220000-0x0000000000257000-memory.dmp

    Filesize

    220KB

  • memory/1556-59-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1556-60-0x00000000049E4000-0x00000000049E6000-memory.dmp

    Filesize

    8KB