Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 01:21
Static task
static1
Behavioral task
behavioral1
Sample
a0bc531aa6f892e29404f3387a20052932d483884deabb252b036dd28d97f590.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
a0bc531aa6f892e29404f3387a20052932d483884deabb252b036dd28d97f590.exe
-
Size
382KB
-
MD5
817724375ecb0b83c9869413acc651e9
-
SHA1
c3a113122f62736a9c0814217b2b92db113659c5
-
SHA256
a0bc531aa6f892e29404f3387a20052932d483884deabb252b036dd28d97f590
-
SHA512
1ac2e5c5d2472d43d811bb00637b4c48b83371fa6af654143fb3844727148d91b4c76e22d317fddd4fcaae98a36c2a30b76ec343159000c7421388f654529859
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2016-118-0x0000000004C70000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/2016-123-0x0000000004EF0000-0x0000000004F0D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2016-115-0x0000000002FE6000-0x0000000003009000-memory.dmpFilesize
140KB
-
memory/2016-117-0x0000000000400000-0x0000000002DB7000-memory.dmpFilesize
41.7MB
-
memory/2016-116-0x0000000002E40000-0x0000000002F8A000-memory.dmpFilesize
1.3MB
-
memory/2016-118-0x0000000004C70000-0x0000000004C8F000-memory.dmpFilesize
124KB
-
memory/2016-119-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/2016-120-0x0000000007670000-0x0000000007671000-memory.dmpFilesize
4KB
-
memory/2016-121-0x0000000007662000-0x0000000007663000-memory.dmpFilesize
4KB
-
memory/2016-122-0x0000000007663000-0x0000000007664000-memory.dmpFilesize
4KB
-
memory/2016-123-0x0000000004EF0000-0x0000000004F0D000-memory.dmpFilesize
116KB
-
memory/2016-124-0x0000000007B70000-0x0000000007B71000-memory.dmpFilesize
4KB
-
memory/2016-125-0x00000000074D0000-0x00000000074D1000-memory.dmpFilesize
4KB
-
memory/2016-126-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/2016-127-0x0000000007664000-0x0000000007666000-memory.dmpFilesize
8KB
-
memory/2016-128-0x0000000007610000-0x0000000007611000-memory.dmpFilesize
4KB
-
memory/2016-129-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB