Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
13-10-2021 23:42
Static task
static1
Behavioral task
behavioral1
Sample
4c97b51398f073f30c89d75207fb4214adad075ea8fb2cb3e37ce1c6733d09c8.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
4c97b51398f073f30c89d75207fb4214adad075ea8fb2cb3e37ce1c6733d09c8.exe
-
Size
324KB
-
MD5
aadfc97b1c03cd942513d338e899dbc2
-
SHA1
9d73f01681bd05621e6922431d0bcb0c8fafa1a5
-
SHA256
4c97b51398f073f30c89d75207fb4214adad075ea8fb2cb3e37ce1c6733d09c8
-
SHA512
e443af3b04909ba7771b62b3ed14df857fc523915ef8f68cdad7f8fc0a78c49b5aae8ce8eef11aeeb5aeab5b554c5dc5e9aa1d7a3a861aea39a07194341c6f21
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
usamoney
C2
45.142.215.47:27643
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3512-116-0x0000000002250000-0x000000000226F000-memory.dmp family_redline behavioral1/memory/3512-123-0x00000000049F0000-0x0000000004A0D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3512-116-0x0000000002250000-0x000000000226F000-memory.dmpFilesize
124KB
-
memory/3512-117-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/3512-118-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/3512-120-0x0000000004A40000-0x0000000004A41000-memory.dmpFilesize
4KB
-
memory/3512-119-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB
-
memory/3512-121-0x0000000004A42000-0x0000000004A43000-memory.dmpFilesize
4KB
-
memory/3512-122-0x0000000004A43000-0x0000000004A44000-memory.dmpFilesize
4KB
-
memory/3512-123-0x00000000049F0000-0x0000000004A0D000-memory.dmpFilesize
116KB
-
memory/3512-124-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/3512-125-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/3512-126-0x00000000055F0000-0x00000000055F1000-memory.dmpFilesize
4KB
-
memory/3512-127-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/3512-128-0x0000000005780000-0x0000000005781000-memory.dmpFilesize
4KB
-
memory/3512-129-0x0000000004A44000-0x0000000004A46000-memory.dmpFilesize
8KB