Analysis
-
max time kernel
148s -
max time network
163s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 18:52
Static task
static1
Behavioral task
behavioral1
Sample
64ed8af82d056d4a168a7a7b8c325df25cb58a809fd579bf6258b70b963d9149.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
64ed8af82d056d4a168a7a7b8c325df25cb58a809fd579bf6258b70b963d9149.exe
-
Size
309KB
-
MD5
4a4bb2d0413cdcd6542913f83944bb4e
-
SHA1
14c4317c38092d32517497769395bb89a13db471
-
SHA256
64ed8af82d056d4a168a7a7b8c325df25cb58a809fd579bf6258b70b963d9149
-
SHA512
851ce7922c8666adf11189b606a3f4364d41c04c97586ee5a832834df30edf7c48eb76bba5b8cabc2848a51694064596d55c907fce47d369011ee95b983acf36
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
usamoney
C2
45.142.215.47:27643
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3704-116-0x0000000002170000-0x000000000218F000-memory.dmp family_redline behavioral1/memory/3704-118-0x0000000002450000-0x000000000246D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3704-115-0x0000000000679000-0x000000000069C000-memory.dmpFilesize
140KB
-
memory/3704-116-0x0000000002170000-0x000000000218F000-memory.dmpFilesize
124KB
-
memory/3704-117-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/3704-118-0x0000000002450000-0x000000000246D000-memory.dmpFilesize
116KB
-
memory/3704-119-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/3704-120-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/3704-121-0x0000000005690000-0x0000000005691000-memory.dmpFilesize
4KB
-
memory/3704-122-0x0000000000510000-0x0000000000540000-memory.dmpFilesize
192KB
-
memory/3704-123-0x0000000000400000-0x00000000004BF000-memory.dmpFilesize
764KB
-
memory/3704-124-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/3704-125-0x0000000004B72000-0x0000000004B73000-memory.dmpFilesize
4KB
-
memory/3704-126-0x0000000004B73000-0x0000000004B74000-memory.dmpFilesize
4KB
-
memory/3704-127-0x0000000004AC0000-0x0000000004AC1000-memory.dmpFilesize
4KB
-
memory/3704-128-0x00000000057A0000-0x00000000057A1000-memory.dmpFilesize
4KB
-
memory/3704-129-0x0000000004B74000-0x0000000004B76000-memory.dmpFilesize
8KB