Analysis

  • max time kernel
    78s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 08:45

General

  • Target

    0x00090000000122f0-2027.exe

  • Size

    175KB

  • MD5

    b1d4f7dfddd8979b4f6aba9d59ac37df

  • SHA1

    e89962d61972f0d056c46205de29c3d0f25be2b1

  • SHA256

    289ce7b23008b31d5b06600e0a6168b75d642632e5525614c137da0fe1eb95a1

  • SHA512

    691699f5ac91c33251dacf2d7a95211f70be39c0c4f459e82010bd2b20251a126ea2001cd507f26d90a6db97d6b3170a7b88e5f716d6a89a4c18708c6832b038

  • SSDEEP

    3072:KxqZWJBaKULo3pfEWGljeerDF/hevTxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw09:4qZIpfEWYL/hk

Malware Config

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x00090000000122f0-2027.exe
    "C:\Users\Admin\AppData\Local\Temp\0x00090000000122f0-2027.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2908-133-0x00000000002B0000-0x00000000002E2000-memory.dmp

    Filesize

    200KB

  • memory/2908-134-0x00000000050A0000-0x00000000056B8000-memory.dmp

    Filesize

    6.1MB

  • memory/2908-135-0x0000000004BF0000-0x0000000004CFA000-memory.dmp

    Filesize

    1.0MB

  • memory/2908-136-0x0000000004B20000-0x0000000004B32000-memory.dmp

    Filesize

    72KB

  • memory/2908-137-0x0000000004B80000-0x0000000004BBC000-memory.dmp

    Filesize

    240KB

  • memory/2908-138-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2908-139-0x0000000005C70000-0x0000000006214000-memory.dmp

    Filesize

    5.6MB

  • memory/2908-140-0x0000000004FF0000-0x0000000005082000-memory.dmp

    Filesize

    584KB

  • memory/2908-141-0x00000000056C0000-0x0000000005726000-memory.dmp

    Filesize

    408KB

  • memory/2908-142-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2908-143-0x00000000063F0000-0x00000000065B2000-memory.dmp

    Filesize

    1.8MB

  • memory/2908-144-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/2908-145-0x00000000066C0000-0x0000000006736000-memory.dmp

    Filesize

    472KB

  • memory/2908-146-0x0000000006390000-0x00000000063E0000-memory.dmp

    Filesize

    320KB