Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    12-04-2022 11:57

General

  • Target

    dc5f75ecc5957d7ddb28bbe2ce9c6c23.exe

  • Size

    366KB

  • MD5

    dc5f75ecc5957d7ddb28bbe2ce9c6c23

  • SHA1

    96ee5a0c5ef0dfbb92e3effb2e9def6969bfb582

  • SHA256

    030031967edc4442758b080c291fa29e2220d299194173c0a7dd484609f0ad15

  • SHA512

    bfa7f6541aceaf33d13a505e91ea3a93ad3436eb906538652334d4566fd23b5257cee789096e3c78b630a6c55503867def06424ed8e614c74a0d566738ba80a5

Malware Config

Extracted

Family

redline

Botnet

50

C2

193.106.191.153:23196

Attributes
  • auth_value

    8735fcb130c82dd9d353478678d60bde

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc5f75ecc5957d7ddb28bbe2ce9c6c23.exe
    "C:\Users\Admin\AppData\Local\Temp\dc5f75ecc5957d7ddb28bbe2ce9c6c23.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1544-54-0x00000000002C8000-0x00000000002F2000-memory.dmp

    Filesize

    168KB

  • memory/1544-55-0x0000000002000000-0x0000000002030000-memory.dmp

    Filesize

    192KB

  • memory/1544-56-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/1544-57-0x00000000002C8000-0x00000000002F2000-memory.dmp

    Filesize

    168KB

  • memory/1544-58-0x0000000000270000-0x00000000002A7000-memory.dmp

    Filesize

    220KB

  • memory/1544-59-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1544-60-0x0000000004874000-0x0000000004876000-memory.dmp

    Filesize

    8KB