Static task
static1
Behavioral task
behavioral1
Sample
b6d6b7b618047b4dbe1221f14d81d9b6ea8013aa981bcb3a4723848b41627d28.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b6d6b7b618047b4dbe1221f14d81d9b6ea8013aa981bcb3a4723848b41627d28.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
b6d6b7b618047b4dbe1221f14d81d9b6ea8013aa981bcb3a4723848b41627d28
-
Size
4.0MB
-
MD5
ee10252b6111c702bb6abfcaf9f5ab42
-
SHA1
d0d0ced5a321fe3dfd390604a69c0d4747ec1ee8
-
SHA256
b6d6b7b618047b4dbe1221f14d81d9b6ea8013aa981bcb3a4723848b41627d28
-
SHA512
41771f8e5d4653e62af9e745d20bf56413ed2f3d4a32effcbfbdf4d38dbec95e6dc0d2fef950fbf5acdf2d9ff5d441005c3df9e0a58a6a9a9c9a5db299aa7ffd
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
acrobatt_ads_emu
C2
94.232.44.45:35200
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
b6d6b7b618047b4dbe1221f14d81d9b6ea8013aa981bcb3a4723848b41627d28.exe windows x86