Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 21:30
Static task
static1
Behavioral task
behavioral1
Sample
648caef0ec45209a318c753f5863f7e1a8412efe67c3d7568d4e779a04b1645b.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
648caef0ec45209a318c753f5863f7e1a8412efe67c3d7568d4e779a04b1645b.exe
-
Size
364KB
-
MD5
2150d000be5c76dd433079f8f86b0892
-
SHA1
c1e710a070f46a847839db84a6085368116f25f5
-
SHA256
648caef0ec45209a318c753f5863f7e1a8412efe67c3d7568d4e779a04b1645b
-
SHA512
f8471836078bac5bd119d83a264dd2967ebb549d9cd3aa486b271b21d35c5355dc16bd3277d0ca06abc1cd5ef1d103148ccb094b6b9e6273f8d7bb55601556c1
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
paladin
C2
188.68.201.6:10085
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3168-118-0x0000000004D80000-0x0000000004DAF000-memory.dmp family_redline behavioral1/memory/3168-123-0x0000000004F30000-0x0000000004F5E000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3168-116-0x0000000003070000-0x00000000031BA000-memory.dmpFilesize
1.3MB
-
memory/3168-115-0x0000000003070000-0x00000000031BA000-memory.dmpFilesize
1.3MB
-
memory/3168-117-0x0000000000400000-0x0000000002F22000-memory.dmpFilesize
43.1MB
-
memory/3168-118-0x0000000004D80000-0x0000000004DAF000-memory.dmpFilesize
188KB
-
memory/3168-119-0x0000000007890000-0x0000000007891000-memory.dmpFilesize
4KB
-
memory/3168-120-0x0000000007880000-0x0000000007881000-memory.dmpFilesize
4KB
-
memory/3168-122-0x0000000007883000-0x0000000007884000-memory.dmpFilesize
4KB
-
memory/3168-121-0x0000000007882000-0x0000000007883000-memory.dmpFilesize
4KB
-
memory/3168-123-0x0000000004F30000-0x0000000004F5E000-memory.dmpFilesize
184KB
-
memory/3168-124-0x0000000007D90000-0x0000000007D91000-memory.dmpFilesize
4KB
-
memory/3168-125-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/3168-126-0x0000000007700000-0x0000000007701000-memory.dmpFilesize
4KB
-
memory/3168-127-0x0000000007884000-0x0000000007886000-memory.dmpFilesize
8KB
-
memory/3168-128-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/3168-129-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB