Analysis

  • max time kernel
    41s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    11-04-2022 06:41

General

  • Target

    e09ac7299dc0f0d6e0e6defc44cf7f9e.exe

  • Size

    367KB

  • MD5

    e09ac7299dc0f0d6e0e6defc44cf7f9e

  • SHA1

    1b9528e5750344d12ed21da2c951e7323c926166

  • SHA256

    ddf33bf30a8e0d35b049d817cfcf224bd6519e0056aebe401ee48081484cdddd

  • SHA512

    85d1aadd8e43a363753a440313bc0ad2f5a6d01b19a2c40b1ff3fa525e5f8548fb7d4f59d9d1ebd4d4e8fbcc51da7e38a7769b22fd43842722ac96ed2bd71c53

Malware Config

Extracted

Family

redline

Botnet

50

C2

193.106.191.132:23196

Attributes
  • auth_value

    8735fcb130c82dd9d353478678d60bde

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\e09ac7299dc0f0d6e0e6defc44cf7f9e.exe
    "C:\Users\Admin\AppData\Local\Temp\e09ac7299dc0f0d6e0e6defc44cf7f9e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1400-54-0x000000000061A000-0x0000000000644000-memory.dmp

    Filesize

    168KB

  • memory/1400-55-0x000000000061A000-0x0000000000644000-memory.dmp

    Filesize

    168KB

  • memory/1400-56-0x0000000000230000-0x0000000000267000-memory.dmp

    Filesize

    220KB

  • memory/1400-57-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1400-58-0x00000000021B0000-0x00000000021E0000-memory.dmp

    Filesize

    192KB

  • memory/1400-59-0x0000000004750000-0x000000000477E000-memory.dmp

    Filesize

    184KB

  • memory/1400-60-0x00000000021E4000-0x00000000021E6000-memory.dmp

    Filesize

    8KB