Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 22:31
Static task
static1
Behavioral task
behavioral1
Sample
3c576e8f39e81eb9aff91b55dce463a5db2a20892986bcdeb4829bcfc6351651.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
3c576e8f39e81eb9aff91b55dce463a5db2a20892986bcdeb4829bcfc6351651.exe
-
Size
337KB
-
MD5
e80681106957dc595225a282db3bf5f8
-
SHA1
792df044e45b7a700dd07a8a91e77f030cf3d418
-
SHA256
3c576e8f39e81eb9aff91b55dce463a5db2a20892986bcdeb4829bcfc6351651
-
SHA512
b53e1365ca6fe7252efbb7abfe3e43ee5168afb6eb0653a733afb5cb57e95b87acca205a27638d177183d87e244a42cff32caa61bb5b0db135144b4a4b400b52
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4136-118-0x0000000004F10000-0x0000000004F2F000-memory.dmp family_redline behavioral1/memory/4136-123-0x0000000004F80000-0x0000000004F9D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4136-116-0x0000000004C80000-0x0000000004CB0000-memory.dmpFilesize
192KB
-
memory/4136-115-0x0000000002F20000-0x000000000306A000-memory.dmpFilesize
1.3MB
-
memory/4136-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/4136-118-0x0000000004F10000-0x0000000004F2F000-memory.dmpFilesize
124KB
-
memory/4136-119-0x00000000075C0000-0x00000000075C1000-memory.dmpFilesize
4KB
-
memory/4136-120-0x0000000004F60000-0x0000000004F61000-memory.dmpFilesize
4KB
-
memory/4136-121-0x0000000004F62000-0x0000000004F63000-memory.dmpFilesize
4KB
-
memory/4136-122-0x0000000004F63000-0x0000000004F64000-memory.dmpFilesize
4KB
-
memory/4136-123-0x0000000004F80000-0x0000000004F9D000-memory.dmpFilesize
116KB
-
memory/4136-124-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/4136-125-0x0000000008180000-0x0000000008181000-memory.dmpFilesize
4KB
-
memory/4136-126-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB
-
memory/4136-127-0x0000000004F64000-0x0000000004F66000-memory.dmpFilesize
8KB
-
memory/4136-128-0x00000000082C0000-0x00000000082C1000-memory.dmpFilesize
4KB
-
memory/4136-129-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB