Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 00:44

General

  • Target

    quarantine/BXxKvLN.exe

  • Size

    1.7MB

  • MD5

    971c0e70de5bb3de0c9911cf96d11743

  • SHA1

    43badfc19a7e07671817cf05b39bc28a6c22e122

  • SHA256

    67c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d

  • SHA512

    a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2

  • SSDEEP

    49152:PILW3W4OH2ImHQRD2H8Vs1sfh8h08GhPdYJblsacEadrrtNb24q:i+eJNbHq

Malware Config

Extracted

Family

redline

Botnet

testproliv

C2

45.155.103.183:1488

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\quarantine\BXxKvLN.exe
    "C:\Users\Admin\AppData\Local\Temp\quarantine\BXxKvLN.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/832-0-0x00000210FFC00000-0x00000210FFD00000-memory.dmp

    Filesize

    1024KB

  • memory/832-1-0x00007FFCBC3C3000-0x00007FFCBC3C5000-memory.dmp

    Filesize

    8KB

  • memory/832-2-0x0000021081650000-0x00000210816A2000-memory.dmp

    Filesize

    328KB

  • memory/832-3-0x00007FFCBC3C0000-0x00007FFCBCE81000-memory.dmp

    Filesize

    10.8MB

  • memory/832-4-0x00007FFCBC3C0000-0x00007FFCBCE81000-memory.dmp

    Filesize

    10.8MB

  • memory/832-5-0x00007FFCBC3C0000-0x00007FFCBCE81000-memory.dmp

    Filesize

    10.8MB

  • memory/832-6-0x0000021100110000-0x000002110021A000-memory.dmp

    Filesize

    1.0MB

  • memory/832-7-0x00000210FFF80000-0x00000210FFF92000-memory.dmp

    Filesize

    72KB

  • memory/832-8-0x0000021100000000-0x000002110003C000-memory.dmp

    Filesize

    240KB

  • memory/832-9-0x00007FF6B3B30000-0x00007FF6B3CDE000-memory.dmp

    Filesize

    1.7MB

  • memory/832-10-0x0000021100040000-0x0000021100090000-memory.dmp

    Filesize

    320KB

  • memory/832-11-0x00000211003F0000-0x00000211005B2000-memory.dmp

    Filesize

    1.8MB

  • memory/832-12-0x000002109B3A0000-0x000002109B8C8000-memory.dmp

    Filesize

    5.2MB

  • memory/832-13-0x00000210FFC00000-0x00000210FFD00000-memory.dmp

    Filesize

    1024KB

  • memory/832-14-0x00007FFCBC3C3000-0x00007FFCBC3C5000-memory.dmp

    Filesize

    8KB

  • memory/832-15-0x00007FFCBC3C0000-0x00007FFCBCE81000-memory.dmp

    Filesize

    10.8MB

  • memory/832-16-0x00007FFCBC3C0000-0x00007FFCBCE81000-memory.dmp

    Filesize

    10.8MB