Analysis

  • max time kernel
    141s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2023, 07:36

General

  • Target

    2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe

  • Size

    208KB

  • MD5

    d730927643381563b56f8ef8eef9cdf8

  • SHA1

    5afc045c1d405c98de66da03668a1d0e266f116e

  • SHA256

    c0c1bda204a11b82eb5422d0b082ff03c2ea57a6af58ec264f816967d382943d

  • SHA512

    cffbc360aea5b4f417ebceeb95948838b3b41837b5138fb1fa7c1705d2ab6de60f330a1f76384e69e807124c2afc22b1b35edb580dd2a8cc7665864da213ec56

  • SSDEEP

    3072:brrs690Gg877NFEk42BufCdNXOvwenR2hO2m4+wGze+z8e8hB:nrs6k877zNOoenR2o2mvJ

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2888-62-0x00000000025C0000-0x00000000025F4000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-133-0x00000000009E0000-0x0000000000A14000-memory.dmp

    Filesize

    208KB

  • memory/2220-134-0x0000000074F70000-0x0000000075720000-memory.dmp

    Filesize

    7.7MB

  • memory/2220-135-0x0000000005AE0000-0x00000000060F8000-memory.dmp

    Filesize

    6.1MB

  • memory/2220-136-0x00000000055D0000-0x00000000056DA000-memory.dmp

    Filesize

    1.0MB

  • memory/2220-137-0x00000000054C0000-0x00000000054D2000-memory.dmp

    Filesize

    72KB

  • memory/2220-138-0x00000000053B0000-0x00000000053C0000-memory.dmp

    Filesize

    64KB

  • memory/2220-139-0x0000000005520000-0x000000000555C000-memory.dmp

    Filesize

    240KB

  • memory/2220-140-0x0000000005820000-0x0000000005896000-memory.dmp

    Filesize

    472KB

  • memory/2220-141-0x0000000005940000-0x00000000059D2000-memory.dmp

    Filesize

    584KB

  • memory/2220-142-0x0000000006BA0000-0x0000000007144000-memory.dmp

    Filesize

    5.6MB

  • memory/2220-143-0x00000000059E0000-0x0000000005A46000-memory.dmp

    Filesize

    408KB

  • memory/2220-144-0x0000000074F70000-0x0000000075720000-memory.dmp

    Filesize

    7.7MB

  • memory/2220-145-0x0000000006470000-0x00000000064C0000-memory.dmp

    Filesize

    320KB

  • memory/2220-146-0x00000000053B0000-0x00000000053C0000-memory.dmp

    Filesize

    64KB

  • memory/2220-147-0x00000000069C0000-0x0000000006B82000-memory.dmp

    Filesize

    1.8MB

  • memory/2220-148-0x0000000008D70000-0x000000000929C000-memory.dmp

    Filesize

    5.2MB

  • memory/2220-150-0x0000000074F70000-0x0000000075720000-memory.dmp

    Filesize

    7.7MB