Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 14:31
Static task
static1
Behavioral task
behavioral1
Sample
8352faaac416d58aba31c5bff5f5bd2ed02638f079bb900b15d6a75ad7a40c99.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
8352faaac416d58aba31c5bff5f5bd2ed02638f079bb900b15d6a75ad7a40c99.exe
-
Size
406KB
-
MD5
8339cdd136105e8307d46970fb7ce882
-
SHA1
a74219b6a64e3908d0707acbbaae242c647e1767
-
SHA256
8352faaac416d58aba31c5bff5f5bd2ed02638f079bb900b15d6a75ad7a40c99
-
SHA512
e0bafdc7177e2a614501e74e858c6a14698816b2ce44f9f00e3c32ca39b13929b90d843724219f42b01ca236e1396e66ebc1ee4500788f7f0123515928116161
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1676-118-0x0000000004DB0000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/1676-123-0x0000000007420000-0x000000000743D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1676-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1676-117-0x0000000000400000-0x0000000002DBC000-memory.dmpFilesize
41.7MB
-
memory/1676-118-0x0000000004DB0000-0x0000000004DCF000-memory.dmpFilesize
124KB
-
memory/1676-119-0x0000000007470000-0x0000000007471000-memory.dmpFilesize
4KB
-
memory/1676-120-0x0000000007460000-0x0000000007461000-memory.dmpFilesize
4KB
-
memory/1676-121-0x0000000007462000-0x0000000007463000-memory.dmpFilesize
4KB
-
memory/1676-122-0x0000000007463000-0x0000000007464000-memory.dmpFilesize
4KB
-
memory/1676-123-0x0000000007420000-0x000000000743D000-memory.dmpFilesize
116KB
-
memory/1676-124-0x0000000007970000-0x0000000007971000-memory.dmpFilesize
4KB
-
memory/1676-125-0x0000000007FF0000-0x0000000007FF1000-memory.dmpFilesize
4KB
-
memory/1676-126-0x0000000008020000-0x0000000008021000-memory.dmpFilesize
4KB
-
memory/1676-127-0x0000000008130000-0x0000000008131000-memory.dmpFilesize
4KB
-
memory/1676-128-0x0000000007464000-0x0000000007466000-memory.dmpFilesize
8KB
-
memory/1676-129-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB