Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 13:40
Static task
static1
Behavioral task
behavioral1
Sample
73c1f1e66a668ab6a9c8e6688574651bc6eb9f7716a08e25914cf8daef004472.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
73c1f1e66a668ab6a9c8e6688574651bc6eb9f7716a08e25914cf8daef004472.exe
-
Size
406KB
-
MD5
92ab32cdf89c33206734d0c247d38faa
-
SHA1
b599d40ddb3ea41606016db72ce8d6f9fb98bca4
-
SHA256
73c1f1e66a668ab6a9c8e6688574651bc6eb9f7716a08e25914cf8daef004472
-
SHA512
8434ce86250abad3e8e80c3b550405780289d310c9608e64a9d0a6a07316409cf1f15d82fd3dbcdb51bd3b41cc9b6c05a34215565e3d5f16648ebc4d410db116
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2432-118-0x00000000030D0000-0x00000000030EF000-memory.dmp family_redline behavioral1/memory/2432-123-0x0000000004BE0000-0x0000000004BFD000-memory.dmp family_redline