Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    20-10-2021 06:04

General

  • Target

    63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15.exe

  • Size

    405KB

  • MD5

    7e3578364a2673d3cb92e80782c4b4be

  • SHA1

    d11c9e2fb622c03a21078277957389c03376853b

  • SHA256

    63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15

  • SHA512

    8611cc98143b5840f536a35d916d5ff2f7cc72be8227b375dd77d3c96e9608568a9e91866290edb2ed2b2dd30d13e711ed4f7c4fe9314892609aaeb77fe96944

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15.exe
    "C:\Users\Admin\AppData\Local\Temp\63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15.exe"
    1⤵
      PID:3940

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3940-115-0x0000000003066000-0x0000000003089000-memory.dmp
      Filesize

      140KB

    • memory/3940-116-0x0000000003010000-0x000000000302F000-memory.dmp
      Filesize

      124KB

    • memory/3940-117-0x0000000002DC0000-0x0000000002E6E000-memory.dmp
      Filesize

      696KB

    • memory/3940-118-0x0000000000400000-0x0000000002DBD000-memory.dmp
      Filesize

      41.7MB

    • memory/3940-119-0x00000000075B0000-0x00000000075B1000-memory.dmp
      Filesize

      4KB

    • memory/3940-120-0x00000000075B2000-0x00000000075B3000-memory.dmp
      Filesize

      4KB

    • memory/3940-121-0x00000000075B3000-0x00000000075B4000-memory.dmp
      Filesize

      4KB

    • memory/3940-122-0x00000000075C0000-0x00000000075C1000-memory.dmp
      Filesize

      4KB

    • memory/3940-123-0x0000000004B80000-0x0000000004B9D000-memory.dmp
      Filesize

      116KB

    • memory/3940-124-0x0000000007AC0000-0x0000000007AC1000-memory.dmp
      Filesize

      4KB

    • memory/3940-125-0x0000000004E50000-0x0000000004E51000-memory.dmp
      Filesize

      4KB

    • memory/3940-126-0x0000000007490000-0x0000000007491000-memory.dmp
      Filesize

      4KB

    • memory/3940-127-0x0000000004E70000-0x0000000004E71000-memory.dmp
      Filesize

      4KB

    • memory/3940-128-0x00000000075B4000-0x00000000075B6000-memory.dmp
      Filesize

      8KB

    • memory/3940-129-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
      Filesize

      4KB