Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2022, 15:54

General

  • Target

    file.exe

  • Size

    441KB

  • MD5

    f816db892285955f716e274668888009

  • SHA1

    811d1179329d94b9710f61728ef1d591e8d509a7

  • SHA256

    41ba630d872de2e11573fc56d0d35f660af4400916cf45339d9bfbd6ac61ac1d

  • SHA512

    396fffece646e240dc242e02d7472317f4fdcea214b5313f0289afdcf04718bd462395e7642fb00bdfcd7edd7315d1c065ce3e1977f823122339e7e6fc31f9d1

  • SSDEEP

    6144:u48ricn5QHQPyttFisqYfFj9zGvGHKQrI9XkJlsldqt5EykTU7ITsq:d8jn5QjFirY9paO/r9vuqt5cI7

Malware Config

Extracted

Family

redline

Botnet

mix

C2

193.106.191.25:47242

Attributes
  • auth_value

    5469d87831a100553f2f10d3aadec8bb

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1492-54-0x0000000002D40000-0x0000000002D8A000-memory.dmp

    Filesize

    296KB

  • memory/1492-55-0x00000000046B0000-0x00000000046FA000-memory.dmp

    Filesize

    296KB

  • memory/1492-56-0x0000000002DBB000-0x0000000002DEE000-memory.dmp

    Filesize

    204KB

  • memory/1492-57-0x0000000000220000-0x000000000028E000-memory.dmp

    Filesize

    440KB

  • memory/1492-58-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB

  • memory/1492-59-0x0000000000400000-0x0000000002C5C000-memory.dmp

    Filesize

    40.4MB

  • memory/1492-60-0x0000000002DBB000-0x0000000002DEE000-memory.dmp

    Filesize

    204KB

  • memory/1492-61-0x0000000000400000-0x0000000002C5C000-memory.dmp

    Filesize

    40.4MB