Analysis

  • max time kernel
    4294183s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    11-04-2022 02:46

General

  • Target

    505c08b34025ea724caeb6dc89e9ed58.exe

  • Size

    345KB

  • MD5

    505c08b34025ea724caeb6dc89e9ed58

  • SHA1

    ba063c25f267274bcdad0d4098eff5d7d5b62293

  • SHA256

    9a4327936a40f16d7a08d54473df45caac32eeb608185f9c9690f4fddc0c97a8

  • SHA512

    da74817eb1c52df3155d51f480e6f29c08b2cce1372eb07932738e4e2e2bd36969ec3ee7c55745aca4de7ec5b2f5ddaa885181755e6a59ceee8a391af9510bf1

Malware Config

Extracted

Family

redline

Botnet

50

C2

193.106.191.132:23196

Attributes
  • auth_value

    8735fcb130c82dd9d353478678d60bde

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\505c08b34025ea724caeb6dc89e9ed58.exe
    "C:\Users\Admin\AppData\Local\Temp\505c08b34025ea724caeb6dc89e9ed58.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1960-54-0x000000000057A000-0x00000000005A4000-memory.dmp

    Filesize

    168KB

  • memory/1960-55-0x0000000001EF0000-0x0000000001F20000-memory.dmp

    Filesize

    192KB

  • memory/1960-57-0x0000000000220000-0x0000000000257000-memory.dmp

    Filesize

    220KB

  • memory/1960-56-0x000000000057A000-0x00000000005A4000-memory.dmp

    Filesize

    168KB

  • memory/1960-58-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1960-59-0x0000000002010000-0x000000000203E000-memory.dmp

    Filesize

    184KB

  • memory/1960-60-0x00000000047B4000-0x00000000047B6000-memory.dmp

    Filesize

    8KB