Analysis

  • max time kernel
    38s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2022, 12:34

General

  • Target

    file.exe

  • Size

    350KB

  • MD5

    9b2bbe1e86d1c48c48dd106565e42945

  • SHA1

    2fee6d44497100383a361af33455305ac32020d2

  • SHA256

    83825646d0f03e119b6402cd493ccf1ef4b59be8607a5677a81f68aec0924e9c

  • SHA512

    c6c4d616d1c58d1251e4084922b3e9840653e2dfead010e12e20e1781d4bfeed92ec84892ecdee857bdb07f77b8c4e06c715d8be0b052dbc5f9514bda8795cb0

  • SSDEEP

    6144:K688omo8L+e+dNL/CtXVJemd/RpYmlEuONPTN3N9kT4lHzx9oUGBkcc:K6z5hl+6V/emd/RpYoONFNmT49N6Fc

Malware Config

Extracted

Family

redline

Botnet

mix

C2

193.106.191.25:47242

Attributes
  • auth_value

    5469d87831a100553f2f10d3aadec8bb

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/900-54-0x00000000006DB000-0x000000000070E000-memory.dmp

    Filesize

    204KB

  • memory/900-55-0x0000000000220000-0x000000000028E000-memory.dmp

    Filesize

    440KB

  • memory/900-56-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/900-57-0x00000000048C0000-0x000000000490A000-memory.dmp

    Filesize

    296KB

  • memory/900-58-0x0000000004910000-0x000000000495A000-memory.dmp

    Filesize

    296KB

  • memory/900-59-0x0000000075C61000-0x0000000075C63000-memory.dmp

    Filesize

    8KB

  • memory/900-60-0x00000000006DB000-0x000000000070E000-memory.dmp

    Filesize

    204KB

  • memory/900-61-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB