Analysis

  • max time kernel
    123s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 07:56

General

  • Target

    40C2A7D6BAF2B837FA891F988971DEEF.exe

  • Size

    181KB

  • MD5

    40c2a7d6baf2b837fa891f988971deef

  • SHA1

    fdd8aa270e3a888641a17f72e918c6d5859e63c8

  • SHA256

    8ba6d00a29c4a11c7fcbf696066abb1e891aef6ab8bbc1f7ddd128da24a9a8f6

  • SHA512

    3867a5e79dd515e0e69f3801d28a611dfb235f8b5b8401089171c508fc27bd40f14073bed41dbc26ea25ca640f672f2c43b25c2c9866b91b7547061be26d2285

  • SSDEEP

    3072:WPBlahblH+Brnc65Ekc2IIPM134sv5fn6aMRYHNhnJJPlRUq:aL6H+h5PpIIioE6CN5nlRX

Malware Config

Extracted

Family

redline

Botnet

git

C2

129.153.80.87:8855

Attributes
  • auth_value

    2eed1f062323c11b744a0508cf87aabe

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\40C2A7D6BAF2B837FA891F988971DEEF.exe
    "C:\Users\Admin\AppData\Local\Temp\40C2A7D6BAF2B837FA891F988971DEEF.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/644-0-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/644-1-0x00000000001C0000-0x00000000001E4000-memory.dmp

    Filesize

    144KB

  • memory/644-5-0x0000000074BF0000-0x00000000753A0000-memory.dmp

    Filesize

    7.7MB

  • memory/644-6-0x0000000004960000-0x0000000004F78000-memory.dmp

    Filesize

    6.1MB

  • memory/644-7-0x0000000005010000-0x0000000005022000-memory.dmp

    Filesize

    72KB

  • memory/644-8-0x0000000005030000-0x000000000513A000-memory.dmp

    Filesize

    1.0MB

  • memory/644-9-0x0000000005260000-0x0000000005270000-memory.dmp

    Filesize

    64KB

  • memory/644-10-0x0000000005140000-0x000000000517C000-memory.dmp

    Filesize

    240KB

  • memory/644-11-0x00000000051C0000-0x000000000520C000-memory.dmp

    Filesize

    304KB

  • memory/644-12-0x0000000005360000-0x00000000053C6000-memory.dmp

    Filesize

    408KB

  • memory/644-13-0x0000000005870000-0x0000000005902000-memory.dmp

    Filesize

    584KB

  • memory/644-14-0x0000000005920000-0x0000000005EC4000-memory.dmp

    Filesize

    5.6MB

  • memory/644-15-0x0000000006960000-0x00000000069B0000-memory.dmp

    Filesize

    320KB

  • memory/644-16-0x00000000069C0000-0x0000000006A36000-memory.dmp

    Filesize

    472KB

  • memory/644-17-0x00000000061B0000-0x00000000061CE000-memory.dmp

    Filesize

    120KB

  • memory/644-18-0x0000000006260000-0x0000000006422000-memory.dmp

    Filesize

    1.8MB

  • memory/644-19-0x0000000006B40000-0x000000000706C000-memory.dmp

    Filesize

    5.2MB

  • memory/644-22-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/644-23-0x0000000074BF0000-0x00000000753A0000-memory.dmp

    Filesize

    7.7MB