Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2023, 12:50

General

  • Target

    0x0007000000015e40-129.exe

  • Size

    174KB

  • MD5

    4887ad90edd2c4b5d0b9734b53fb1e6a

  • SHA1

    5d2fde54981fdc5bc58b4e3b43e1d4b0c9a61216

  • SHA256

    67d69decb14477b8ceeda009888911fd36dd2c8bca0016ab91bff41d9667fc41

  • SHA512

    e9635fb79aaa70870b97cab3f79bb9fa55d3c3122b7c0b702e8f23f8fbc2e81b835d998137521958e93287bc56c30ce5f2d9196d43e525f76a44b6d86fb6b160

  • SSDEEP

    3072:Ep+ZGv0jI0px5X4OCoYecFxUwsE0GzhXcroONJs8e8hc:y+pjI0px5X2bsE0acroONK

Malware Config

Extracted

Family

redline

Botnet

savin

C2

77.91.124.156:19071

Attributes
  • auth_value

    a1a05b810428195ab7bb63b132ea0c8d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0007000000015e40-129.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0007000000015e40-129.exe"
    1⤵
      PID:1444

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1444-133-0x00000000000A0000-0x00000000000D0000-memory.dmp

      Filesize

      192KB

    • memory/1444-134-0x0000000074490000-0x0000000074C40000-memory.dmp

      Filesize

      7.7MB

    • memory/1444-135-0x0000000005140000-0x0000000005758000-memory.dmp

      Filesize

      6.1MB

    • memory/1444-136-0x0000000004C30000-0x0000000004D3A000-memory.dmp

      Filesize

      1.0MB

    • memory/1444-138-0x00000000049D0000-0x00000000049E0000-memory.dmp

      Filesize

      64KB

    • memory/1444-137-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1444-139-0x0000000004B80000-0x0000000004BBC000-memory.dmp

      Filesize

      240KB

    • memory/1444-140-0x0000000074490000-0x0000000074C40000-memory.dmp

      Filesize

      7.7MB

    • memory/1444-141-0x00000000049D0000-0x00000000049E0000-memory.dmp

      Filesize

      64KB