Analysis
-
max time kernel
133s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 23:00
Static task
static1
Behavioral task
behavioral1
Sample
1dedd29d4c3bf33035bbb674c86b5bc7cfde37c591fb14910313f2f53a32de72.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
1dedd29d4c3bf33035bbb674c86b5bc7cfde37c591fb14910313f2f53a32de72.exe
-
Size
385KB
-
MD5
9b64b74a63fc666bc826461ee4b68ed7
-
SHA1
ef1b8434a202ce8b4e4e2ef7e72c28531154e724
-
SHA256
1dedd29d4c3bf33035bbb674c86b5bc7cfde37c591fb14910313f2f53a32de72
-
SHA512
a20ecbe7d9bd2ff2b9e085f24ca6427f4ef60cc9aef31daa99890bbd0d5bf188a55e6d2596e9021f1ebdf380fa4552c4e12efea8d46f87c3ce81bdf3eed20686
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
paladin
C2
188.68.201.6:10085
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1908-116-0x0000000002A30000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/1908-118-0x0000000002BE0000-0x0000000002C0E000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1908-116-0x0000000002A30000-0x0000000002A5F000-memory.dmpFilesize
188KB
-
memory/1908-117-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/1908-118-0x0000000002BE0000-0x0000000002C0E000-memory.dmpFilesize
184KB
-
memory/1908-119-0x0000000000960000-0x00000000009A4000-memory.dmpFilesize
272KB
-
memory/1908-120-0x0000000000400000-0x0000000000890000-memory.dmpFilesize
4.6MB
-
memory/1908-122-0x0000000005660000-0x0000000005661000-memory.dmpFilesize
4KB
-
memory/1908-123-0x0000000005152000-0x0000000005153000-memory.dmpFilesize
4KB
-
memory/1908-121-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/1908-124-0x0000000005153000-0x0000000005154000-memory.dmpFilesize
4KB
-
memory/1908-125-0x0000000002C90000-0x0000000002C91000-memory.dmpFilesize
4KB
-
memory/1908-126-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/1908-127-0x0000000005C70000-0x0000000005C71000-memory.dmpFilesize
4KB
-
memory/1908-128-0x0000000005CC0000-0x0000000005CC1000-memory.dmpFilesize
4KB
-
memory/1908-129-0x0000000005154000-0x0000000005156000-memory.dmpFilesize
8KB