Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 06:31
Static task
static1
Behavioral task
behavioral1
Sample
b9a11466dd7e744b5d24f92824c5ab8d0275897de1bf033baa2c3533f5f9273c.exe
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
b9a11466dd7e744b5d24f92824c5ab8d0275897de1bf033baa2c3533f5f9273c.exe
-
Size
405KB
-
MD5
d4b815e42c175e97db69724207f17748
-
SHA1
fd7ef0ec7cdb335a49e2006d2bc6522e65b56b27
-
SHA256
b9a11466dd7e744b5d24f92824c5ab8d0275897de1bf033baa2c3533f5f9273c
-
SHA512
8ed632edb4affc0f94b7a8f9828cf8111b377240aad7ffa2e364a7f046420a09cf497520a641f9a7f2125f6487f55305bda78ddcd4dda9012619d2972fca8152
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3592-118-0x0000000004B00000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3592-123-0x0000000004E50000-0x0000000004E6D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3592-115-0x0000000003056000-0x0000000003079000-memory.dmpFilesize
140KB
-
memory/3592-117-0x0000000000400000-0x0000000002DBD000-memory.dmpFilesize
41.7MB
-
memory/3592-116-0x0000000002FF0000-0x0000000003020000-memory.dmpFilesize
192KB
-
memory/3592-118-0x0000000004B00000-0x0000000004B1F000-memory.dmpFilesize
124KB
-
memory/3592-119-0x0000000007460000-0x0000000007461000-memory.dmpFilesize
4KB
-
memory/3592-120-0x0000000007462000-0x0000000007463000-memory.dmpFilesize
4KB
-
memory/3592-121-0x0000000007463000-0x0000000007464000-memory.dmpFilesize
4KB
-
memory/3592-122-0x0000000007470000-0x0000000007471000-memory.dmpFilesize
4KB
-
memory/3592-123-0x0000000004E50000-0x0000000004E6D000-memory.dmpFilesize
116KB
-
memory/3592-124-0x0000000007970000-0x0000000007971000-memory.dmpFilesize
4KB
-
memory/3592-125-0x0000000007390000-0x0000000007391000-memory.dmpFilesize
4KB
-
memory/3592-126-0x0000000007F80000-0x0000000007F81000-memory.dmpFilesize
4KB
-
memory/3592-127-0x00000000073C0000-0x00000000073C1000-memory.dmpFilesize
4KB
-
memory/3592-128-0x0000000007464000-0x0000000007466000-memory.dmpFilesize
8KB
-
memory/3592-129-0x0000000008090000-0x0000000008091000-memory.dmpFilesize
4KB