Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 17:20
Static task
static1
Behavioral task
behavioral1
Sample
4f84f108bffd9207d21c3db11e89211c2a4b79fc330476a01fde35d49cdbebf3.exe
Resource
win10-en-20211014
0 signatures
0 seconds
General
-
Target
4f84f108bffd9207d21c3db11e89211c2a4b79fc330476a01fde35d49cdbebf3.exe
-
Size
412KB
-
MD5
fc69ef581cf0d683fd44f49191f9501f
-
SHA1
7963bb4952815822399e331b96d06da400246857
-
SHA256
4f84f108bffd9207d21c3db11e89211c2a4b79fc330476a01fde35d49cdbebf3
-
SHA512
0a50eb5d435930218d79114017acce975e29e6b6760bead1e55b4b34554b614f3a5078b8868f2e9d59d7aeba69eb50be1e65495fc255c1c4d7a60731a792c70e
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1524-118-0x0000000004E20000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/1524-120-0x00000000077F0000-0x000000000780D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1524-115-0x0000000002F81000-0x0000000002FA4000-memory.dmpFilesize
140KB
-
memory/1524-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1524-117-0x0000000000400000-0x0000000002DBE000-memory.dmpFilesize
41.7MB
-
memory/1524-118-0x0000000004E20000-0x0000000004E3F000-memory.dmpFilesize
124KB
-
memory/1524-119-0x00000000072A0000-0x00000000072A1000-memory.dmpFilesize
4KB
-
memory/1524-120-0x00000000077F0000-0x000000000780D000-memory.dmpFilesize
116KB
-
memory/1524-122-0x0000000004DC2000-0x0000000004DC3000-memory.dmpFilesize
4KB
-
memory/1524-121-0x0000000004DC0000-0x0000000004DC1000-memory.dmpFilesize
4KB
-
memory/1524-123-0x0000000004DC3000-0x0000000004DC4000-memory.dmpFilesize
4KB
-
memory/1524-124-0x0000000007810000-0x0000000007811000-memory.dmpFilesize
4KB
-
memory/1524-125-0x0000000007EB0000-0x0000000007EB1000-memory.dmpFilesize
4KB
-
memory/1524-126-0x0000000007EE0000-0x0000000007EE1000-memory.dmpFilesize
4KB
-
memory/1524-127-0x0000000004DC4000-0x0000000004DC6000-memory.dmpFilesize
8KB
-
memory/1524-128-0x0000000007FF0000-0x0000000007FF1000-memory.dmpFilesize
4KB
-
memory/1524-129-0x0000000008070000-0x0000000008071000-memory.dmpFilesize
4KB