Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2023 11:17

General

  • Target

    TRXLoader.exe

  • Size

    167KB

  • MD5

    e49b5c4669b85228518fbedfa92ba950

  • SHA1

    be352f390039b4db42bafff6caf5662fc278fa52

  • SHA256

    4992be3d3767710e05ba63f6d105f8b2aaf0216db4a35b6a4e2056248c59683b

  • SHA512

    14d5c8c923e6995b6426950539a9c593f742f238804c604d0806303e38d0f5e8a87e858d1f7242510cef5efac105040f9b57627a0779d760be31f99370294903

  • SSDEEP

    3072:ScX9GCUkJPmSyYmYTHDb4S1I8E7bbKDhVLI8bxKI:SctGC/JPwYMS1TAI

Malware Config

Extracted

Family

redline

Botnet

2074014949_99

C2

https://pastebin.com/raw/tnW31tPp

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\TRXLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\TRXLoader.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-133-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1184-134-0x0000000002170000-0x000000000218E000-memory.dmp

    Filesize

    120KB

  • memory/1184-138-0x0000000074B70000-0x0000000075320000-memory.dmp

    Filesize

    7.7MB

  • memory/1184-139-0x0000000004AC0000-0x00000000050D8000-memory.dmp

    Filesize

    6.1MB

  • memory/1184-140-0x0000000005150000-0x0000000005162000-memory.dmp

    Filesize

    72KB

  • memory/1184-141-0x0000000005170000-0x000000000527A000-memory.dmp

    Filesize

    1.0MB

  • memory/1184-142-0x0000000002450000-0x0000000002460000-memory.dmp

    Filesize

    64KB

  • memory/1184-143-0x0000000005DB0000-0x0000000005DEC000-memory.dmp

    Filesize

    240KB

  • memory/1184-144-0x0000000005FA0000-0x0000000006162000-memory.dmp

    Filesize

    1.8MB

  • memory/1184-145-0x0000000006190000-0x00000000066BC000-memory.dmp

    Filesize

    5.2MB

  • memory/1184-146-0x0000000006770000-0x00000000067D6000-memory.dmp

    Filesize

    408KB

  • memory/1184-147-0x00000000069C0000-0x0000000006A52000-memory.dmp

    Filesize

    584KB

  • memory/1184-148-0x0000000006A60000-0x0000000007004000-memory.dmp

    Filesize

    5.6MB

  • memory/1184-149-0x0000000007A40000-0x0000000007AB6000-memory.dmp

    Filesize

    472KB

  • memory/1184-150-0x0000000007B00000-0x0000000007B1E000-memory.dmp

    Filesize

    120KB

  • memory/1184-151-0x0000000007390000-0x00000000073E0000-memory.dmp

    Filesize

    320KB

  • memory/1184-152-0x0000000074B70000-0x0000000075320000-memory.dmp

    Filesize

    7.7MB

  • memory/1184-153-0x0000000002450000-0x0000000002460000-memory.dmp

    Filesize

    64KB

  • memory/1184-156-0x0000000074B70000-0x0000000075320000-memory.dmp

    Filesize

    7.7MB