Analysis
-
max time kernel
147s -
max time network
162s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 05:21
Static task
static1
Behavioral task
behavioral1
Sample
13daef0bc04ee9913b87c060fdbd9c80ea6a6b65d295651d21a4287b3bd73035.exe
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
13daef0bc04ee9913b87c060fdbd9c80ea6a6b65d295651d21a4287b3bd73035.exe
-
Size
405KB
-
MD5
efa81bdf23e3f04c6a8d59f8aecfe213
-
SHA1
3eab2f2de2874410ee4189eca8c1a33bba145362
-
SHA256
13daef0bc04ee9913b87c060fdbd9c80ea6a6b65d295651d21a4287b3bd73035
-
SHA512
0391427c6307b696f1d902bb82c0672b26789003379c4aee7169f5d657aae763099e3752fe9de1b9113cafde5edb4dd1cd8806bac801cd173abcb4dc8f20ef9e
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2180-117-0x0000000004BC0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2180-119-0x0000000004E70000-0x0000000004E8D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2180-116-0x0000000002DC0000-0x0000000002E6E000-memory.dmpFilesize
696KB
-
memory/2180-117-0x0000000004BC0000-0x0000000004BDF000-memory.dmpFilesize
124KB
-
memory/2180-118-0x0000000007650000-0x0000000007651000-memory.dmpFilesize
4KB
-
memory/2180-119-0x0000000004E70000-0x0000000004E8D000-memory.dmpFilesize
116KB
-
memory/2180-120-0x0000000000400000-0x0000000002DBD000-memory.dmpFilesize
41.7MB
-
memory/2180-122-0x0000000007642000-0x0000000007643000-memory.dmpFilesize
4KB
-
memory/2180-121-0x0000000007640000-0x0000000007641000-memory.dmpFilesize
4KB
-
memory/2180-123-0x0000000007643000-0x0000000007644000-memory.dmpFilesize
4KB
-
memory/2180-124-0x0000000007B50000-0x0000000007B51000-memory.dmpFilesize
4KB
-
memory/2180-125-0x00000000074D0000-0x00000000074D1000-memory.dmpFilesize
4KB
-
memory/2180-126-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/2180-127-0x0000000008160000-0x0000000008161000-memory.dmpFilesize
4KB
-
memory/2180-128-0x0000000007644000-0x0000000007646000-memory.dmpFilesize
8KB
-
memory/2180-129-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB