Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 05:20
Static task
static1
Behavioral task
behavioral1
Sample
e516465b39a52d13591f9603666cb4cf5fd97e4d186b5248ec63ec289d5aa8f0.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
e516465b39a52d13591f9603666cb4cf5fd97e4d186b5248ec63ec289d5aa8f0.exe
-
Size
406KB
-
MD5
c42ae320273bb3dd8cf7beb862ebd227
-
SHA1
c1045f4846a51f8ae21751cea016a8858ea42408
-
SHA256
e516465b39a52d13591f9603666cb4cf5fd97e4d186b5248ec63ec289d5aa8f0
-
SHA512
adfc47b846d8d56df6bcaedee33ae5eccd3a26597abe641a043a0a75da7e376a701a77cf8d97bccdcbd96ce7e7ae2670dc9dc74e40a140f88f31f4093c6b44cb
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/5072-118-0x0000000004D50000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/5072-120-0x0000000004E20000-0x0000000004E3D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5072-116-0x0000000004AE0000-0x0000000004B10000-memory.dmpFilesize
192KB
-
memory/5072-117-0x0000000000400000-0x0000000002DBD000-memory.dmpFilesize
41.7MB
-
memory/5072-118-0x0000000004D50000-0x0000000004D6F000-memory.dmpFilesize
124KB
-
memory/5072-119-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB
-
memory/5072-120-0x0000000004E20000-0x0000000004E3D000-memory.dmpFilesize
116KB
-
memory/5072-121-0x0000000007BA0000-0x0000000007BA1000-memory.dmpFilesize
4KB
-
memory/5072-122-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/5072-123-0x0000000007692000-0x0000000007693000-memory.dmpFilesize
4KB
-
memory/5072-124-0x0000000007693000-0x0000000007694000-memory.dmpFilesize
4KB
-
memory/5072-125-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/5072-126-0x0000000007530000-0x0000000007531000-memory.dmpFilesize
4KB
-
memory/5072-127-0x0000000007694000-0x0000000007696000-memory.dmpFilesize
8KB
-
memory/5072-128-0x0000000007640000-0x0000000007641000-memory.dmpFilesize
4KB
-
memory/5072-129-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB