Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 05:10
Static task
static1
Behavioral task
behavioral1
Sample
011ce3f456abbb1c932c8000b33da0037d9e7014d0077b6d7e1dab6512cd9fc0.exe
Resource
win10-en-20211014
0 signatures
0 seconds
General
-
Target
011ce3f456abbb1c932c8000b33da0037d9e7014d0077b6d7e1dab6512cd9fc0.exe
-
Size
405KB
-
MD5
fbb86cabd07bc0e38b8b2d7295e01b33
-
SHA1
9e38c05dad3758e86c7231ad17ba1d5f290f1c4c
-
SHA256
011ce3f456abbb1c932c8000b33da0037d9e7014d0077b6d7e1dab6512cd9fc0
-
SHA512
887dff71f97059478d95ed0201b0f61f9093f06f5d40b37cd5ba053ec81402b722192595fec78f19a1daeeab5f2d4c0dbd97e2c17ae284d59c2645cbcca88ac4
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2052-118-0x0000000004C40000-0x0000000004C5F000-memory.dmp family_redline behavioral1/memory/2052-123-0x0000000007930000-0x000000000794D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2052-115-0x00000000030A6000-0x00000000030C9000-memory.dmpFilesize
140KB
-
memory/2052-116-0x0000000003040000-0x0000000003070000-memory.dmpFilesize
192KB
-
memory/2052-117-0x0000000000400000-0x0000000002DBD000-memory.dmpFilesize
41.7MB
-
memory/2052-118-0x0000000004C40000-0x0000000004C5F000-memory.dmpFilesize
124KB
-
memory/2052-119-0x0000000007420000-0x0000000007421000-memory.dmpFilesize
4KB
-
memory/2052-120-0x0000000007422000-0x0000000007423000-memory.dmpFilesize
4KB
-
memory/2052-121-0x0000000007430000-0x0000000007431000-memory.dmpFilesize
4KB
-
memory/2052-122-0x0000000007423000-0x0000000007424000-memory.dmpFilesize
4KB
-
memory/2052-123-0x0000000007930000-0x000000000794D000-memory.dmpFilesize
116KB
-
memory/2052-124-0x0000000007950000-0x0000000007951000-memory.dmpFilesize
4KB
-
memory/2052-125-0x0000000007FF0000-0x0000000007FF1000-memory.dmpFilesize
4KB
-
memory/2052-126-0x0000000008020000-0x0000000008021000-memory.dmpFilesize
4KB
-
memory/2052-127-0x0000000008130000-0x0000000008131000-memory.dmpFilesize
4KB
-
memory/2052-128-0x0000000007424000-0x0000000007426000-memory.dmpFilesize
8KB
-
memory/2052-129-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB