Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 10:50
Static task
static1
Behavioral task
behavioral1
Sample
676be2aa0c89f191c40888f73c78e60e6f366b594829d968b3fa4543ce43763e.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
676be2aa0c89f191c40888f73c78e60e6f366b594829d968b3fa4543ce43763e.exe
-
Size
405KB
-
MD5
fb6b7202ecf82f18d8c5db7cb6383b39
-
SHA1
d1191bf3d0cfcfede87a808642bdd6ec69ccbe20
-
SHA256
676be2aa0c89f191c40888f73c78e60e6f366b594829d968b3fa4543ce43763e
-
SHA512
1bd6ba6314a9edd86eb0c97be6fc162044e93cc39f2ff6b91e3fae361ded195c4bbf9d38c7e657824c1ebd1f36d823975ee79cb989165de94d8ef02341b655e6
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1420-118-0x0000000004C40000-0x0000000004C5F000-memory.dmp family_redline behavioral1/memory/1420-121-0x0000000004E90000-0x0000000004EAD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1420-115-0x0000000003121000-0x0000000003144000-memory.dmpFilesize
140KB
-
memory/1420-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1420-117-0x0000000000400000-0x0000000002DBC000-memory.dmpFilesize
41.7MB
-
memory/1420-118-0x0000000004C40000-0x0000000004C5F000-memory.dmpFilesize
124KB
-
memory/1420-119-0x00000000074F0000-0x00000000074F1000-memory.dmpFilesize
4KB
-
memory/1420-120-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/1420-121-0x0000000004E90000-0x0000000004EAD000-memory.dmpFilesize
116KB
-
memory/1420-122-0x0000000007A00000-0x0000000007A01000-memory.dmpFilesize
4KB
-
memory/1420-123-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/1420-124-0x00000000074F2000-0x00000000074F3000-memory.dmpFilesize
4KB
-
memory/1420-125-0x00000000074F3000-0x00000000074F4000-memory.dmpFilesize
4KB
-
memory/1420-126-0x00000000073C0000-0x00000000073C1000-memory.dmpFilesize
4KB
-
memory/1420-127-0x0000000008010000-0x0000000008011000-memory.dmpFilesize
4KB
-
memory/1420-128-0x00000000074F4000-0x00000000074F6000-memory.dmpFilesize
8KB
-
memory/1420-129-0x0000000008070000-0x0000000008071000-memory.dmpFilesize
4KB