Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
14-10-2021 06:30
Static task
static1
Behavioral task
behavioral1
Sample
2c2a79aa31f5458fe990b58b1df1631ea7fd2f9d80390a48f032ef2da9e29c4b.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
2c2a79aa31f5458fe990b58b1df1631ea7fd2f9d80390a48f032ef2da9e29c4b.exe
-
Size
317KB
-
MD5
5dfe8a9a980ee0324eb4404aa347211e
-
SHA1
67a168ea24e286c1eee43041920f67e73331141f
-
SHA256
2c2a79aa31f5458fe990b58b1df1631ea7fd2f9d80390a48f032ef2da9e29c4b
-
SHA512
ed6f7266cbd9cc25c2fc1a876457f0b2da37748482b0099fd2bb061ad5578aa6eca6e56cfbac122c6c9ccd7b75a7e1e8bd551b6483e2f1421483835b4920041a
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
usamoney
C2
45.142.215.47:27643
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/656-117-0x0000000002300000-0x000000000231F000-memory.dmp family_redline behavioral1/memory/656-122-0x0000000004B50000-0x0000000004B6D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/656-114-0x0000000000681000-0x00000000006A4000-memory.dmpFilesize
140KB
-
memory/656-116-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/656-115-0x00000000004D0000-0x000000000061A000-memory.dmpFilesize
1.3MB
-
memory/656-117-0x0000000002300000-0x000000000231F000-memory.dmpFilesize
124KB
-
memory/656-118-0x0000000004C60000-0x0000000004C61000-memory.dmpFilesize
4KB
-
memory/656-120-0x0000000004C52000-0x0000000004C53000-memory.dmpFilesize
4KB
-
memory/656-119-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/656-121-0x0000000004C53000-0x0000000004C54000-memory.dmpFilesize
4KB
-
memory/656-122-0x0000000004B50000-0x0000000004B6D000-memory.dmpFilesize
116KB
-
memory/656-123-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/656-124-0x0000000004BE0000-0x0000000004BE1000-memory.dmpFilesize
4KB
-
memory/656-125-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB
-
memory/656-126-0x0000000004C54000-0x0000000004C56000-memory.dmpFilesize
8KB
-
memory/656-127-0x0000000004C10000-0x0000000004C11000-memory.dmpFilesize
4KB
-
memory/656-128-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB