Analysis

  • max time kernel
    27s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2023, 00:56

General

  • Target

    file.exe

  • Size

    251KB

  • MD5

    616f0116d5ac033979784f0942ae3ce0

  • SHA1

    2bd71edd6577dc222abc2fd2a24bcdf6428fdb11

  • SHA256

    4a9c93e088da7f15b571b3595624ae59f112d3f532c8265178d4cc71f7ddd8b6

  • SHA512

    4d1b976737301c55739871a524a61f0f148c438cfc8e52ab25ed014a2e607cbdc8707f725869a9eca57d68245b282d63d0c5698cbb580d3f810d9ef897b524a8

  • SSDEEP

    6144:d6krcpMmKgjrwpWSyubkvjz9YYFMAq/33oR4:dNcggj9Zubkvjz9YYFMAq/33oe

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1776-54-0x0000000000220000-0x0000000000250000-memory.dmp

    Filesize

    192KB

  • memory/1776-58-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/1776-59-0x0000000001FB0000-0x0000000001FF0000-memory.dmp

    Filesize

    256KB