Analysis

  • max time kernel
    78s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2023, 17:36

General

  • Target

    0fd6abe16eb10c511c44e453b357092c.exe

  • Size

    168KB

  • MD5

    0fd6abe16eb10c511c44e453b357092c

  • SHA1

    62157973b0ca72f69cfe0fe29af26b66e49fc6d3

  • SHA256

    16a6161a7efab534489a56476cf707a3ceffde375993f7991e23865ad7a6f706

  • SHA512

    90c4f20bb9fef6b63ff8b7e8115aa11e737a617575263fc7e71d8a228072b805d6814d4ef840f2ffec2846cbc322dd5a57bd9cf70b47f90e13c141c0e33fc4e0

  • SSDEEP

    1536:VLNTK6nNqlVZRGWhQureIh+xN7COTGqVsbuTESRsATTV83wYk88e8hX:VhTbnmIIG+rqVkKtR9TTV28e8hX

Malware Config

Extracted

Family

redline

Botnet

D2P new

C2

45.32.29.148:34824

Attributes
  • auth_value

    fa80dd4dc7193557e96cfffdcc2cfbd1

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fd6abe16eb10c511c44e453b357092c.exe
    "C:\Users\Admin\AppData\Local\Temp\0fd6abe16eb10c511c44e453b357092c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4124

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4124-133-0x0000000000CE0000-0x0000000000D0E000-memory.dmp

          Filesize

          184KB

        • memory/4124-134-0x000000000B0D0000-0x000000000B6E8000-memory.dmp

          Filesize

          6.1MB

        • memory/4124-135-0x000000000AC50000-0x000000000AD5A000-memory.dmp

          Filesize

          1.0MB

        • memory/4124-136-0x000000000AB80000-0x000000000AB92000-memory.dmp

          Filesize

          72KB

        • memory/4124-137-0x000000000ABE0000-0x000000000AC1C000-memory.dmp

          Filesize

          240KB

        • memory/4124-138-0x0000000005710000-0x0000000005720000-memory.dmp

          Filesize

          64KB

        • memory/4124-139-0x0000000005710000-0x0000000005720000-memory.dmp

          Filesize

          64KB

        • memory/4124-140-0x0000000001490000-0x0000000001506000-memory.dmp

          Filesize

          472KB

        • memory/4124-141-0x00000000015B0000-0x0000000001642000-memory.dmp

          Filesize

          584KB

        • memory/4124-142-0x000000000BDA0000-0x000000000C344000-memory.dmp

          Filesize

          5.6MB

        • memory/4124-143-0x0000000001510000-0x0000000001576000-memory.dmp

          Filesize

          408KB

        • memory/4124-144-0x000000000BA40000-0x000000000BA90000-memory.dmp

          Filesize

          320KB

        • memory/4124-145-0x000000000C620000-0x000000000C7E2000-memory.dmp

          Filesize

          1.8MB

        • memory/4124-146-0x000000000D330000-0x000000000D85C000-memory.dmp

          Filesize

          5.2MB