Analysis

  • max time kernel
    145s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 00:58

General

  • Target

    tmp.exe

  • Size

    174KB

  • MD5

    c2ce41232bcd0237adee4dc075136551

  • SHA1

    868b38083f67f4c9d756364aa1c0c5d5d69595d2

  • SHA256

    a0c33c79e0ccec5a8f5e71082180366893e3e0527fc1fcf9c1e6ca097e39b0fe

  • SHA512

    ff4e50b483086db00924feae3a88fc59b4bad11fffc7582eddc1526834d1ce04e833a01981b529e0396bea3cc8981f4ac69f68acf81bf540686318b065b5970d

  • SSDEEP

    3072:2rbL67KI0O2QuYwOvAuYW8YkE0GuRRIeJ18e8hR:2rOKI0O2QuYl8YkE0XIez

Malware Config

Extracted

Family

redline

Botnet

lnk_mega

C2

89.23.98.75:45768

Attributes
  • auth_value

    5aa066b39a5d56eccdb22301dab01085

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
      PID:2012

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2012-0-0x00000000010B0000-0x00000000010E0000-memory.dmp

      Filesize

      192KB

    • memory/2012-1-0x0000000074390000-0x0000000074A7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2012-2-0x0000000000470000-0x0000000000476000-memory.dmp

      Filesize

      24KB

    • memory/2012-3-0x0000000000EC0000-0x0000000000F00000-memory.dmp

      Filesize

      256KB

    • memory/2012-4-0x0000000074390000-0x0000000074A7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2012-5-0x0000000000EC0000-0x0000000000F00000-memory.dmp

      Filesize

      256KB