Analysis

  • max time kernel
    4294178s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    11-04-2022 04:56

General

  • Target

    77fb56f60d9d5cbb230f0b2a07f89770.exe

  • Size

    345KB

  • MD5

    77fb56f60d9d5cbb230f0b2a07f89770

  • SHA1

    5aef5b479e154c68ebe04a723f37be8fc558af99

  • SHA256

    311522dc27e0de5a20712678203bd63b3012a7ddf4443a8f177b61d537ff6dbb

  • SHA512

    025e8a227b2060448c10f31f9e50d4c02341a3a7a1db4986d0a2c2fb52275536239007a3338046c6d322396a319e99e24358aeb0d2eb3ede82b6acdad4e8b85d

Malware Config

Extracted

Family

redline

Botnet

50

C2

193.106.191.132:23196

Attributes
  • auth_value

    8735fcb130c82dd9d353478678d60bde

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\77fb56f60d9d5cbb230f0b2a07f89770.exe
    "C:\Users\Admin\AppData\Local\Temp\77fb56f60d9d5cbb230f0b2a07f89770.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-54-0x00000000005AA000-0x00000000005D3000-memory.dmp

    Filesize

    164KB

  • memory/1808-55-0x0000000000560000-0x0000000000590000-memory.dmp

    Filesize

    192KB

  • memory/1808-56-0x00000000009B0000-0x00000000009DE000-memory.dmp

    Filesize

    184KB

  • memory/1808-57-0x00000000005AA000-0x00000000005D3000-memory.dmp

    Filesize

    164KB

  • memory/1808-58-0x0000000000220000-0x0000000000257000-memory.dmp

    Filesize

    220KB

  • memory/1808-59-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1808-60-0x00000000021C4000-0x00000000021C6000-memory.dmp

    Filesize

    8KB