Analysis

  • max time kernel
    148s
  • max time network
    163s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    20-10-2021 12:01

General

  • Target

    fb7cc288fd3f8d9c07d58e2d7c1272ae1b308208ae9366abf33f96f9c62c0d94.exe

  • Size

    407KB

  • MD5

    edab0157c16d38f7bfa3cde5402c8fdf

  • SHA1

    ec5a1b4fe175617a819da4d6f5be7abb5596dd0d

  • SHA256

    fb7cc288fd3f8d9c07d58e2d7c1272ae1b308208ae9366abf33f96f9c62c0d94

  • SHA512

    61ac107c7e2ac02c5358faea69f6779f9e2393fd057e8d8e0aa695141a2ff3a302ad4bb81b71eef993ce3530289064cc2cb8d7e3412d844e040c07f036f13acb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb7cc288fd3f8d9c07d58e2d7c1272ae1b308208ae9366abf33f96f9c62c0d94.exe
    "C:\Users\Admin\AppData\Local\Temp\fb7cc288fd3f8d9c07d58e2d7c1272ae1b308208ae9366abf33f96f9c62c0d94.exe"
    1⤵
      PID:1752

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1752-116-0x00000000001C0000-0x00000000001F0000-memory.dmp
      Filesize

      192KB

    • memory/1752-117-0x0000000000400000-0x0000000002DBC000-memory.dmp
      Filesize

      41.7MB

    • memory/1752-118-0x0000000004BC0000-0x0000000004BDF000-memory.dmp
      Filesize

      124KB

    • memory/1752-119-0x00000000074E0000-0x00000000074E1000-memory.dmp
      Filesize

      4KB

    • memory/1752-120-0x0000000004FD0000-0x0000000004FED000-memory.dmp
      Filesize

      116KB

    • memory/1752-123-0x0000000005042000-0x0000000005043000-memory.dmp
      Filesize

      4KB

    • memory/1752-124-0x0000000005043000-0x0000000005044000-memory.dmp
      Filesize

      4KB

    • memory/1752-122-0x00000000079E0000-0x00000000079E1000-memory.dmp
      Filesize

      4KB

    • memory/1752-121-0x0000000005040000-0x0000000005041000-memory.dmp
      Filesize

      4KB

    • memory/1752-125-0x0000000007FF0000-0x0000000007FF1000-memory.dmp
      Filesize

      4KB

    • memory/1752-126-0x0000000008020000-0x0000000008021000-memory.dmp
      Filesize

      4KB

    • memory/1752-127-0x0000000008130000-0x0000000008131000-memory.dmp
      Filesize

      4KB

    • memory/1752-128-0x0000000005044000-0x0000000005046000-memory.dmp
      Filesize

      8KB

    • memory/1752-129-0x00000000081B0000-0x00000000081B1000-memory.dmp
      Filesize

      4KB