Analysis

  • max time kernel
    80s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 18:44

General

  • Target

    0x001a0000000124a1-1036.exe

  • Size

    175KB

  • MD5

    2bf222e554ef91aa5164f6939ff97f4b

  • SHA1

    6f9ff75bc7226b6f443959f6687e0807e8f878fd

  • SHA256

    c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e

  • SHA512

    36bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7

  • SSDEEP

    3072:sxqZW11a2kX8f516fTKev/FThwrxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuz:CqZk516LTTh

Malware Config

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x001a0000000124a1-1036.exe
    "C:\Users\Admin\AppData\Local\Temp\0x001a0000000124a1-1036.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2884

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2884-133-0x0000000000C70000-0x0000000000CA2000-memory.dmp

          Filesize

          200KB

        • memory/2884-134-0x0000000005CC0000-0x00000000062D8000-memory.dmp

          Filesize

          6.1MB

        • memory/2884-135-0x00000000057B0000-0x00000000058BA000-memory.dmp

          Filesize

          1.0MB

        • memory/2884-136-0x00000000030E0000-0x00000000030F2000-memory.dmp

          Filesize

          72KB

        • memory/2884-137-0x00000000030D0000-0x00000000030E0000-memory.dmp

          Filesize

          64KB

        • memory/2884-138-0x00000000056A0000-0x00000000056DC000-memory.dmp

          Filesize

          240KB

        • memory/2884-139-0x00000000059C0000-0x0000000005A52000-memory.dmp

          Filesize

          584KB

        • memory/2884-140-0x0000000006890000-0x0000000006E34000-memory.dmp

          Filesize

          5.6MB

        • memory/2884-141-0x0000000005C20000-0x0000000005C86000-memory.dmp

          Filesize

          408KB

        • memory/2884-142-0x00000000030D0000-0x00000000030E0000-memory.dmp

          Filesize

          64KB

        • memory/2884-143-0x0000000006EC0000-0x0000000006F36000-memory.dmp

          Filesize

          472KB

        • memory/2884-144-0x0000000006F40000-0x0000000006F90000-memory.dmp

          Filesize

          320KB

        • memory/2884-145-0x0000000007160000-0x0000000007322000-memory.dmp

          Filesize

          1.8MB

        • memory/2884-146-0x0000000007860000-0x0000000007D8C000-memory.dmp

          Filesize

          5.2MB