Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 11:30
Static task
static1
Behavioral task
behavioral1
Sample
691256dc529fcb961e7fa877911a9420497f4358438efb5eaa4d8e150d2037dd.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
691256dc529fcb961e7fa877911a9420497f4358438efb5eaa4d8e150d2037dd.exe
-
Size
405KB
-
MD5
54b69ae67bcf5960e9f8e71e5d4041f6
-
SHA1
e6ac87e66d108929f0fe387730f88c06667fbd9c
-
SHA256
691256dc529fcb961e7fa877911a9420497f4358438efb5eaa4d8e150d2037dd
-
SHA512
4699ba904386bdc4deb2498710b5bb3b59a59e6ce1d84e60958e05391db9e3048ae7a54ae427a86c79bd94a9448b8db91ee7113f4ab3d4ad8ab2bed8b5d7e39c
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3572-119-0x0000000004C00000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/3572-121-0x0000000004EA0000-0x0000000004EBD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3572-115-0x00000000030E1000-0x0000000003104000-memory.dmpFilesize
140KB
-
memory/3572-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/3572-117-0x0000000000400000-0x0000000002DBC000-memory.dmpFilesize
41.7MB
-
memory/3572-118-0x0000000004BD0000-0x0000000004BD1000-memory.dmpFilesize
4KB
-
memory/3572-119-0x0000000004C00000-0x0000000004C1F000-memory.dmpFilesize
124KB
-
memory/3572-120-0x0000000007430000-0x0000000007431000-memory.dmpFilesize
4KB
-
memory/3572-121-0x0000000004EA0000-0x0000000004EBD000-memory.dmpFilesize
116KB
-
memory/3572-122-0x0000000007930000-0x0000000007931000-memory.dmpFilesize
4KB
-
memory/3572-124-0x0000000004BD3000-0x0000000004BD4000-memory.dmpFilesize
4KB
-
memory/3572-123-0x0000000004BD2000-0x0000000004BD3000-memory.dmpFilesize
4KB
-
memory/3572-125-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/3572-126-0x0000000007F40000-0x0000000007F41000-memory.dmpFilesize
4KB
-
memory/3572-127-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/3572-128-0x0000000008070000-0x0000000008071000-memory.dmpFilesize
4KB
-
memory/3572-129-0x0000000004BD4000-0x0000000004BD6000-memory.dmpFilesize
8KB