Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 06:04
Static task
static1
Behavioral task
behavioral1
Sample
63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15.exe
-
Size
405KB
-
MD5
7e3578364a2673d3cb92e80782c4b4be
-
SHA1
d11c9e2fb622c03a21078277957389c03376853b
-
SHA256
63732dbff29621f48f5407eee8756c2351635565acd124d1d05b76fcdf974b15
-
SHA512
8611cc98143b5840f536a35d916d5ff2f7cc72be8227b375dd77d3c96e9608568a9e91866290edb2ed2b2dd30d13e711ed4f7c4fe9314892609aaeb77fe96944
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3940-116-0x0000000003010000-0x000000000302F000-memory.dmp family_redline behavioral1/memory/3940-123-0x0000000004B80000-0x0000000004B9D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3940-115-0x0000000003066000-0x0000000003089000-memory.dmpFilesize
140KB
-
memory/3940-116-0x0000000003010000-0x000000000302F000-memory.dmpFilesize
124KB
-
memory/3940-117-0x0000000002DC0000-0x0000000002E6E000-memory.dmpFilesize
696KB
-
memory/3940-118-0x0000000000400000-0x0000000002DBD000-memory.dmpFilesize
41.7MB
-
memory/3940-119-0x00000000075B0000-0x00000000075B1000-memory.dmpFilesize
4KB
-
memory/3940-120-0x00000000075B2000-0x00000000075B3000-memory.dmpFilesize
4KB
-
memory/3940-121-0x00000000075B3000-0x00000000075B4000-memory.dmpFilesize
4KB
-
memory/3940-122-0x00000000075C0000-0x00000000075C1000-memory.dmpFilesize
4KB
-
memory/3940-123-0x0000000004B80000-0x0000000004B9D000-memory.dmpFilesize
116KB
-
memory/3940-124-0x0000000007AC0000-0x0000000007AC1000-memory.dmpFilesize
4KB
-
memory/3940-125-0x0000000004E50000-0x0000000004E51000-memory.dmpFilesize
4KB
-
memory/3940-126-0x0000000007490000-0x0000000007491000-memory.dmpFilesize
4KB
-
memory/3940-127-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/3940-128-0x00000000075B4000-0x00000000075B6000-memory.dmpFilesize
8KB
-
memory/3940-129-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB