Analysis

  • max time kernel
    27s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2023 22:19

General

  • Target

    tmp.exe

  • Size

    175KB

  • MD5

    dbf6954a47c2b4ee5f2b9abe34c49ae8

  • SHA1

    5f8a8e434274fe41de96e7ec91c3aac83243497c

  • SHA256

    1adabdcafef5e2c6792df2390ce22151c46f03203bf529a708d776809710b83f

  • SHA512

    8f67526c9b5d1daf7a581c3816ca6797ae76855a33890a605ca34c3c45de7c826868d2968000b4139ee50176cc86d315a94fb982efa5006e6fb40656cfff77aa

  • SSDEEP

    3072:MxqZWFtaKUPLvYjdIaZvFGnem5AdhtbxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUwy:iqZLYxIycsdh

Malware Config

Extracted

Family

redline

Botnet

temposse5555555555

C2

82.115.223.9:15486

Attributes
  • auth_value

    029e96f0c0135a379f06ce0d3ae33ef6

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1144-54-0x0000000000B00000-0x0000000000B32000-memory.dmp

    Filesize

    200KB

  • memory/1144-55-0x0000000075F01000-0x0000000075F03000-memory.dmp

    Filesize

    8KB