Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 17:51
Static task
static1
Behavioral task
behavioral1
Sample
df4254e53a1f43f4ee065376494739b14cc1c8ad7b6d71d34f787b34c4abab11.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
df4254e53a1f43f4ee065376494739b14cc1c8ad7b6d71d34f787b34c4abab11.exe
-
Size
412KB
-
MD5
13b87caa60495d761c15c8c8ae0ddaea
-
SHA1
7af17cb26933777bd4c86ababef0830813f6f2aa
-
SHA256
df4254e53a1f43f4ee065376494739b14cc1c8ad7b6d71d34f787b34c4abab11
-
SHA512
0d2fbd4db08d7959756632a7da19d6cbf053559af0c35fea440b15bf4bb86d1f31ba5c6aafc87ee2f1067c128e79d19874245f088095afdbc596615faeb50b81
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2352-118-0x0000000004C30000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2352-120-0x0000000004DA0000-0x0000000004DBD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2352-115-0x0000000002EC1000-0x0000000002EE4000-memory.dmpFilesize
140KB
-
memory/2352-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/2352-117-0x0000000000400000-0x0000000002DBE000-memory.dmpFilesize
41.7MB
-
memory/2352-118-0x0000000004C30000-0x0000000004C4F000-memory.dmpFilesize
124KB
-
memory/2352-119-0x0000000007570000-0x0000000007571000-memory.dmpFilesize
4KB
-
memory/2352-120-0x0000000004DA0000-0x0000000004DBD000-memory.dmpFilesize
116KB
-
memory/2352-121-0x0000000007A70000-0x0000000007A71000-memory.dmpFilesize
4KB
-
memory/2352-122-0x0000000007560000-0x0000000007561000-memory.dmpFilesize
4KB
-
memory/2352-124-0x0000000007563000-0x0000000007564000-memory.dmpFilesize
4KB
-
memory/2352-123-0x0000000007562000-0x0000000007563000-memory.dmpFilesize
4KB
-
memory/2352-125-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB
-
memory/2352-126-0x00000000073E0000-0x00000000073E1000-memory.dmpFilesize
4KB
-
memory/2352-127-0x00000000074F0000-0x00000000074F1000-memory.dmpFilesize
4KB
-
memory/2352-128-0x0000000008080000-0x0000000008081000-memory.dmpFilesize
4KB
-
memory/2352-129-0x0000000007564000-0x0000000007566000-memory.dmpFilesize
8KB