Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2023, 11:11

General

  • Target

    file.exe

  • Size

    347KB

  • MD5

    b4e676bbca0000cfb22d1dc7546cc35c

  • SHA1

    55334b6eb0a6708f8b088003a392ae7ac9744ac0

  • SHA256

    eb5bd3825785063d9fda32333f634734a8a4a38be91bcff54337d4fa86e732d9

  • SHA512

    7e10f54c7fa3fe8f336a21e0e2b624f974640736da3e0d71abcbb46b31c585cd3c5004ac3a88d1a711cb6a2e8c17e92956ea850273f7d8ec87f1410dbb511a2f

  • SSDEEP

    3072:vPkhfwlvtgS/+9JlIDNB+ZAhdJ4RDWW2Ma78MZdHBlqnUSoyKAFO5WyyMW0K7FDZ:0TS/+9rCyR+N7XHBlqnxVO5WNfDV1D

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2032-55-0x0000000003860000-0x0000000003898000-memory.dmp

    Filesize

    224KB

  • memory/2032-58-0x0000000005F70000-0x0000000005FB0000-memory.dmp

    Filesize

    256KB

  • memory/2032-57-0x00000000039E0000-0x0000000003A14000-memory.dmp

    Filesize

    208KB

  • memory/2032-56-0x00000000003B0000-0x00000000003EF000-memory.dmp

    Filesize

    252KB

  • memory/2032-59-0x0000000003740000-0x0000000003746000-memory.dmp

    Filesize

    24KB

  • memory/2032-60-0x0000000005F70000-0x0000000005FB0000-memory.dmp

    Filesize

    256KB

  • memory/2032-61-0x0000000000400000-0x0000000001B59000-memory.dmp

    Filesize

    23.3MB

  • memory/2032-62-0x0000000000400000-0x0000000001B59000-memory.dmp

    Filesize

    23.3MB