Analysis
-
max time kernel
146s -
max time network
162s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 05:11
Static task
static1
Behavioral task
behavioral1
Sample
d357bc077cad1a79c3429954d39a326d9b4a8ad352a992aa69c089b4d5208120.exe
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
d357bc077cad1a79c3429954d39a326d9b4a8ad352a992aa69c089b4d5208120.exe
-
Size
405KB
-
MD5
09c3c19167ae8094b750c0914904a50d
-
SHA1
6083616d9211fce26ea7a49f2492f784e02a2abf
-
SHA256
d357bc077cad1a79c3429954d39a326d9b4a8ad352a992aa69c089b4d5208120
-
SHA512
c44c322da2f651d1d6d75bec5f32df5efa4879c4babb5a535d52d784aaff3f41880fcce44f2c9fd0ab21de9cab4c136b0cf2e521a8dd5c35392750007294c1a5
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3320-118-0x0000000004BE0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/3320-120-0x0000000004E40000-0x0000000004E5D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3320-116-0x0000000004AE0000-0x0000000004B10000-memory.dmpFilesize
192KB
-
memory/3320-117-0x0000000000400000-0x0000000002DBD000-memory.dmpFilesize
41.7MB
-
memory/3320-118-0x0000000004BE0000-0x0000000004BFF000-memory.dmpFilesize
124KB
-
memory/3320-119-0x00000000075B0000-0x00000000075B1000-memory.dmpFilesize
4KB
-
memory/3320-120-0x0000000004E40000-0x0000000004E5D000-memory.dmpFilesize
116KB
-
memory/3320-121-0x0000000007AB0000-0x0000000007AB1000-memory.dmpFilesize
4KB
-
memory/3320-122-0x00000000074D0000-0x00000000074D1000-memory.dmpFilesize
4KB
-
memory/3320-123-0x00000000080C0000-0x00000000080C1000-memory.dmpFilesize
4KB
-
memory/3320-124-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/3320-128-0x00000000075A4000-0x00000000075A6000-memory.dmpFilesize
8KB
-
memory/3320-127-0x00000000075A3000-0x00000000075A4000-memory.dmpFilesize
4KB
-
memory/3320-126-0x00000000075A2000-0x00000000075A3000-memory.dmpFilesize
4KB
-
memory/3320-125-0x00000000075A0000-0x00000000075A1000-memory.dmpFilesize
4KB
-
memory/3320-129-0x00000000081D0000-0x00000000081D1000-memory.dmpFilesize
4KB