Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 17:50
Static task
static1
Behavioral task
behavioral1
Sample
cd5532daa791371a69e531522aa0a2195f71ecd539958eb8f82667743be0348a.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
cd5532daa791371a69e531522aa0a2195f71ecd539958eb8f82667743be0348a.exe
-
Size
412KB
-
MD5
e845dd21a9a3ac4805f7085c30cfd661
-
SHA1
91c9b69c123bf26ea8ff7206678cf244b2a08bb2
-
SHA256
cd5532daa791371a69e531522aa0a2195f71ecd539958eb8f82667743be0348a
-
SHA512
5a74df31ce03757a1e5117050b6e84d679ba5cccba339cf52f4b37ab13a8bb0ef1f8c7b4534159921f3016f8bbac5917a1149acdf26b9a8761d1782b1e7ed073
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-116-0x0000000004C10000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/1684-121-0x0000000004E20000-0x0000000004E3D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1684-115-0x0000000002FE1000-0x0000000003004000-memory.dmpFilesize
140KB
-
memory/1684-116-0x0000000004C10000-0x0000000004C2F000-memory.dmpFilesize
124KB
-
memory/1684-117-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1684-118-0x0000000000400000-0x0000000002DBE000-memory.dmpFilesize
41.7MB
-
memory/1684-119-0x0000000007530000-0x0000000007531000-memory.dmpFilesize
4KB
-
memory/1684-120-0x0000000007540000-0x0000000007541000-memory.dmpFilesize
4KB
-
memory/1684-121-0x0000000004E20000-0x0000000004E3D000-memory.dmpFilesize
116KB
-
memory/1684-122-0x0000000007A40000-0x0000000007A41000-memory.dmpFilesize
4KB
-
memory/1684-123-0x00000000074D0000-0x00000000074D1000-memory.dmpFilesize
4KB
-
memory/1684-124-0x0000000008050000-0x0000000008051000-memory.dmpFilesize
4KB
-
memory/1684-125-0x0000000008160000-0x0000000008161000-memory.dmpFilesize
4KB
-
memory/1684-126-0x0000000007532000-0x0000000007533000-memory.dmpFilesize
4KB
-
memory/1684-128-0x0000000007534000-0x0000000007536000-memory.dmpFilesize
8KB
-
memory/1684-127-0x0000000007533000-0x0000000007534000-memory.dmpFilesize
4KB
-
memory/1684-129-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB