Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 02:00 UTC

General

  • Target

    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe

  • Size

    175KB

  • MD5

    3c1dd1e570495c0cbc6296bc2ec57170

  • SHA1

    53b1cd687e2c6f174a5ae87c7905ccd04c120b9d

  • SHA256

    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42

  • SHA512

    beae3f1af629a2b87cdadb9f1760ac1d5c75dab98b7cf56c1be7b5590291d32e540ba1fdb452382ad7e39da4f0ffe4341f01a79c3a7be6e7030f781bb51db79e

  • SSDEEP

    3072:zxqZW11a2kX8f5A9eVJ59mhOvxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+M:FqZkqwmh

Malware Config

Extracted

Family

redline

Botnet

lenka

C2

193.233.20.32:4125

Attributes
  • auth_value

    8a60e8b2ec79d6a7e92f9feac39b8830

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    "C:\Users\Admin\AppData\Local\Temp\12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4272

Network

  • flag-us
    DNS
    232.168.11.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.168.11.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    140.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    140.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    56.163.245.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.163.245.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    98.117.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    98.117.19.2.in-addr.arpa
    IN PTR
    Response
    98.117.19.2.in-addr.arpa
    IN PTR
    a2-19-117-98deploystaticakamaitechnologiescom
  • flag-us
    DNS
    72.208.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    72.208.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 193.233.20.32:4125
    12c696e4b8c51bd6b2c7381e7fe38761703f9783c082fb99b3ba861d401b5a42N.exe
    260 B
    200 B
    5
    5
  • 8.8.8.8:53
    232.168.11.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    232.168.11.51.in-addr.arpa

  • 8.8.8.8:53
    140.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    140.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    56.163.245.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    56.163.245.4.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    98.117.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    98.117.19.2.in-addr.arpa

  • 8.8.8.8:53
    72.208.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    72.208.201.84.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4272-0-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/4272-1-0x0000000000080000-0x00000000000B2000-memory.dmp

    Filesize

    200KB

  • memory/4272-2-0x0000000004FD0000-0x00000000055E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4272-3-0x0000000004B50000-0x0000000004C5A000-memory.dmp

    Filesize

    1.0MB

  • memory/4272-4-0x0000000004A80000-0x0000000004A92000-memory.dmp

    Filesize

    72KB

  • memory/4272-5-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/4272-6-0x0000000004B00000-0x0000000004B3C000-memory.dmp

    Filesize

    240KB

  • memory/4272-7-0x0000000004AA0000-0x0000000004AEC000-memory.dmp

    Filesize

    304KB

  • memory/4272-8-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/4272-9-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.