Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    20-10-2021 06:31

General

  • Target

    b9a11466dd7e744b5d24f92824c5ab8d0275897de1bf033baa2c3533f5f9273c.exe

  • Size

    405KB

  • MD5

    d4b815e42c175e97db69724207f17748

  • SHA1

    fd7ef0ec7cdb335a49e2006d2bc6522e65b56b27

  • SHA256

    b9a11466dd7e744b5d24f92824c5ab8d0275897de1bf033baa2c3533f5f9273c

  • SHA512

    8ed632edb4affc0f94b7a8f9828cf8111b377240aad7ffa2e364a7f046420a09cf497520a641f9a7f2125f6487f55305bda78ddcd4dda9012619d2972fca8152

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9a11466dd7e744b5d24f92824c5ab8d0275897de1bf033baa2c3533f5f9273c.exe
    "C:\Users\Admin\AppData\Local\Temp\b9a11466dd7e744b5d24f92824c5ab8d0275897de1bf033baa2c3533f5f9273c.exe"
    1⤵
      PID:3592

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3592-115-0x0000000003056000-0x0000000003079000-memory.dmp
      Filesize

      140KB

    • memory/3592-117-0x0000000000400000-0x0000000002DBD000-memory.dmp
      Filesize

      41.7MB

    • memory/3592-116-0x0000000002FF0000-0x0000000003020000-memory.dmp
      Filesize

      192KB

    • memory/3592-118-0x0000000004B00000-0x0000000004B1F000-memory.dmp
      Filesize

      124KB

    • memory/3592-119-0x0000000007460000-0x0000000007461000-memory.dmp
      Filesize

      4KB

    • memory/3592-120-0x0000000007462000-0x0000000007463000-memory.dmp
      Filesize

      4KB

    • memory/3592-121-0x0000000007463000-0x0000000007464000-memory.dmp
      Filesize

      4KB

    • memory/3592-122-0x0000000007470000-0x0000000007471000-memory.dmp
      Filesize

      4KB

    • memory/3592-123-0x0000000004E50000-0x0000000004E6D000-memory.dmp
      Filesize

      116KB

    • memory/3592-124-0x0000000007970000-0x0000000007971000-memory.dmp
      Filesize

      4KB

    • memory/3592-125-0x0000000007390000-0x0000000007391000-memory.dmp
      Filesize

      4KB

    • memory/3592-126-0x0000000007F80000-0x0000000007F81000-memory.dmp
      Filesize

      4KB

    • memory/3592-127-0x00000000073C0000-0x00000000073C1000-memory.dmp
      Filesize

      4KB

    • memory/3592-128-0x0000000007464000-0x0000000007466000-memory.dmp
      Filesize

      8KB

    • memory/3592-129-0x0000000008090000-0x0000000008091000-memory.dmp
      Filesize

      4KB