Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2023, 05:46

General

  • Target

    file.exe

  • Size

    339KB

  • MD5

    4ae5d873df0889507c12d04ecd4cf923

  • SHA1

    5448f7722833b6e15dc81c43d0e0bc97e09ae391

  • SHA256

    7952b92a191ce0b357bc6aa021f2e15c3b1a86c6a2a6f8358f2c786af72be911

  • SHA512

    0ae3950d5e4087c01ea7d0b36717724271c6384304fa4e8b3cb860fa66a28ffdef07a94ecc27f03650ab26c5419b481bb47921bf56ad11636fc552eda5fae669

  • SSDEEP

    6144:XgSjhW0Ga9E9L2ZeykiqBxWEtGJvkczY:VjhW0xC9qx52xvtCB

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1724-55-0x00000000036A0000-0x00000000036D8000-memory.dmp

    Filesize

    224KB

  • memory/1724-56-0x0000000003720000-0x0000000003754000-memory.dmp

    Filesize

    208KB

  • memory/1724-57-0x0000000003750000-0x0000000003756000-memory.dmp

    Filesize

    24KB

  • memory/1724-59-0x0000000006010000-0x0000000006050000-memory.dmp

    Filesize

    256KB

  • memory/1724-58-0x00000000001C0000-0x00000000001FF000-memory.dmp

    Filesize

    252KB

  • memory/1724-60-0x0000000000400000-0x0000000001B57000-memory.dmp

    Filesize

    23.3MB

  • memory/1724-61-0x0000000000400000-0x0000000001B57000-memory.dmp

    Filesize

    23.3MB