Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 15:20
Static task
static1
Behavioral task
behavioral1
Sample
1345fbd5153abe408c03f8a61bff550e8fc9de1b12b197f2e7913701226a3e61.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
1345fbd5153abe408c03f8a61bff550e8fc9de1b12b197f2e7913701226a3e61.exe
-
Size
411KB
-
MD5
1359b7832bd6e22bfca687db284e8f6c
-
SHA1
f259a61ad76acd5f8e828e5b840c51fd346b574a
-
SHA256
1345fbd5153abe408c03f8a61bff550e8fc9de1b12b197f2e7913701226a3e61
-
SHA512
efa4b478e58026c3d9904c087f354df281adb31b03756e8b3688e9a82fa59490e7c8fd8b88bc1c4d4a82299e42df520db03940397dbad68c3761b2c2b7913916
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2072-118-0x0000000004D20000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/2072-120-0x0000000004DC0000-0x0000000004DDD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2072-116-0x0000000002EB0000-0x0000000002FFA000-memory.dmpFilesize
1.3MB
-
memory/2072-117-0x0000000000400000-0x0000000002DBD000-memory.dmpFilesize
41.7MB
-
memory/2072-118-0x0000000004D20000-0x0000000004D3F000-memory.dmpFilesize
124KB
-
memory/2072-119-0x00000000075E0000-0x00000000075E1000-memory.dmpFilesize
4KB
-
memory/2072-120-0x0000000004DC0000-0x0000000004DDD000-memory.dmpFilesize
116KB
-
memory/2072-121-0x0000000007AE0000-0x0000000007AE1000-memory.dmpFilesize
4KB
-
memory/2072-122-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/2072-123-0x00000000080F0000-0x00000000080F1000-memory.dmpFilesize
4KB
-
memory/2072-124-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/2072-125-0x0000000004E82000-0x0000000004E83000-memory.dmpFilesize
4KB
-
memory/2072-126-0x0000000004E83000-0x0000000004E84000-memory.dmpFilesize
4KB
-
memory/2072-127-0x0000000004E84000-0x0000000004E86000-memory.dmpFilesize
8KB
-
memory/2072-128-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/2072-129-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB