Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 17:51
Static task
static1
Behavioral task
behavioral1
Sample
c4ba5d44ba8fb9eefa7c043fc7946ece2e1e192742074fc2c108ced4fc23795b.exe
Resource
win10-en-20211014
0 signatures
0 seconds
General
-
Target
c4ba5d44ba8fb9eefa7c043fc7946ece2e1e192742074fc2c108ced4fc23795b.exe
-
Size
412KB
-
MD5
e7053b4e17a36b697649b49485fce619
-
SHA1
34dafadf2b59279da3be91f92be98017339ce494
-
SHA256
c4ba5d44ba8fb9eefa7c043fc7946ece2e1e192742074fc2c108ced4fc23795b
-
SHA512
cc7e106146cac6c33c294838f44b6c48089cc9632a7c7fe919d678bec3939511de8cd1afe8ecbb10ad54fc998965c76265c2c4291404b48566812d7dfa776c45
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4144-118-0x0000000004B40000-0x0000000004B5F000-memory.dmp family_redline behavioral1/memory/4144-123-0x0000000004BF0000-0x0000000004C0D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4144-115-0x00000000030C1000-0x00000000030E4000-memory.dmpFilesize
140KB
-
memory/4144-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/4144-117-0x0000000000400000-0x0000000002DBE000-memory.dmpFilesize
41.7MB
-
memory/4144-118-0x0000000004B40000-0x0000000004B5F000-memory.dmpFilesize
124KB
-
memory/4144-119-0x00000000076B0000-0x00000000076B1000-memory.dmpFilesize
4KB
-
memory/4144-120-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB
-
memory/4144-122-0x00000000076A3000-0x00000000076A4000-memory.dmpFilesize
4KB
-
memory/4144-121-0x00000000076A2000-0x00000000076A3000-memory.dmpFilesize
4KB
-
memory/4144-123-0x0000000004BF0000-0x0000000004C0D000-memory.dmpFilesize
116KB
-
memory/4144-124-0x0000000007BB0000-0x0000000007BB1000-memory.dmpFilesize
4KB
-
memory/4144-125-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/4144-126-0x0000000007560000-0x0000000007561000-memory.dmpFilesize
4KB
-
memory/4144-127-0x00000000076A4000-0x00000000076A6000-memory.dmpFilesize
8KB
-
memory/4144-128-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/4144-129-0x00000000081C0000-0x00000000081C1000-memory.dmpFilesize
4KB