Analysis
-
max time kernel
148s -
max time network
163s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 12:01
Static task
static1
Behavioral task
behavioral1
Sample
fb7cc288fd3f8d9c07d58e2d7c1272ae1b308208ae9366abf33f96f9c62c0d94.exe
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
fb7cc288fd3f8d9c07d58e2d7c1272ae1b308208ae9366abf33f96f9c62c0d94.exe
-
Size
407KB
-
MD5
edab0157c16d38f7bfa3cde5402c8fdf
-
SHA1
ec5a1b4fe175617a819da4d6f5be7abb5596dd0d
-
SHA256
fb7cc288fd3f8d9c07d58e2d7c1272ae1b308208ae9366abf33f96f9c62c0d94
-
SHA512
61ac107c7e2ac02c5358faea69f6779f9e2393fd057e8d8e0aa695141a2ff3a302ad4bb81b71eef993ce3530289064cc2cb8d7e3412d844e040c07f036f13acb
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1752-118-0x0000000004BC0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/1752-120-0x0000000004FD0000-0x0000000004FED000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1752-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1752-117-0x0000000000400000-0x0000000002DBC000-memory.dmpFilesize
41.7MB
-
memory/1752-118-0x0000000004BC0000-0x0000000004BDF000-memory.dmpFilesize
124KB
-
memory/1752-119-0x00000000074E0000-0x00000000074E1000-memory.dmpFilesize
4KB
-
memory/1752-120-0x0000000004FD0000-0x0000000004FED000-memory.dmpFilesize
116KB
-
memory/1752-123-0x0000000005042000-0x0000000005043000-memory.dmpFilesize
4KB
-
memory/1752-124-0x0000000005043000-0x0000000005044000-memory.dmpFilesize
4KB
-
memory/1752-122-0x00000000079E0000-0x00000000079E1000-memory.dmpFilesize
4KB
-
memory/1752-121-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/1752-125-0x0000000007FF0000-0x0000000007FF1000-memory.dmpFilesize
4KB
-
memory/1752-126-0x0000000008020000-0x0000000008021000-memory.dmpFilesize
4KB
-
memory/1752-127-0x0000000008130000-0x0000000008131000-memory.dmpFilesize
4KB
-
memory/1752-128-0x0000000005044000-0x0000000005046000-memory.dmpFilesize
8KB
-
memory/1752-129-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB