Analysis

  • max time kernel
    40s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-05-2022 16:41

General

  • Target

    SetupMEXX.exe

  • Size

    365KB

  • MD5

    7370ffed0230ae5356e8ae84124a3d1e

  • SHA1

    55ca5aaae35860b8cc10a6275183330c19ee192c

  • SHA256

    c1206ad84bf49cd1dc2ed0a33cb97327fc6e54e630bacd3ddd0ba6751fde79b0

  • SHA512

    bf17ee8f305edd9ab5f89bd6397af79c41b8a0d48d017e0f2e345f83d4c64bb0d44b372a089d591b0ea6aea8f429a403a050c7358f104bfd8156fb0d18900a25

Malware Config

Extracted

Family

redline

Botnet

50n

C2

193.106.191.190:23196

Attributes
  • auth_value

    d61a9ba1568b3b8e34c959aa0f254969

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\SetupMEXX.exe
    "C:\Users\Admin\AppData\Local\Temp\SetupMEXX.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1424

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
    Filesize

    8KB

  • memory/1424-55-0x0000000002120000-0x0000000002150000-memory.dmp
    Filesize

    192KB

  • memory/1424-56-0x0000000002150000-0x000000000217E000-memory.dmp
    Filesize

    184KB

  • memory/1424-58-0x0000000000230000-0x00000000002CC000-memory.dmp
    Filesize

    624KB

  • memory/1424-57-0x0000000000670000-0x000000000069A000-memory.dmp
    Filesize

    168KB

  • memory/1424-59-0x0000000000400000-0x000000000049C000-memory.dmp
    Filesize

    624KB