Analysis
-
max time kernel
130s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
08-06-2021 09:06
Static task
static1
Behavioral task
behavioral1
Sample
fff4bcd716b7548669070982a5b03964.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
fff4bcd716b7548669070982a5b03964.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
fff4bcd716b7548669070982a5b03964.exe
-
Size
360KB
-
MD5
fff4bcd716b7548669070982a5b03964
-
SHA1
deb87197e1cec0548018f73469ba1544faf1afd3
-
SHA256
e228070565b955ec46508c0115d70d07299a5db66ddca69b798bee43ee7aa603
-
SHA512
d668197ad05661aeb27cf1a7e92ee226c5db200b492b697f6f4ca023649b394fbb7f598938a8bf8dc9ae01644970c92f96ebc6b86602db53ee3d02916c98dd64
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
Kolya
C2
195.201.17.219:25524
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-116-0x00000000022D0000-0x00000000022EA000-memory.dmp family_redline behavioral2/memory/1404-119-0x00000000025A0000-0x00000000025B9000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fff4bcd716b7548669070982a5b03964.exedescription pid process Token: SeDebugPrivilege 1404 fff4bcd716b7548669070982a5b03964.exe