Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 10:01
Static task
static1
Behavioral task
behavioral1
Sample
b70b8408e05202ca446c93cea4dd33cd3c59e0a1fdd91e2d375087a93f6c5a3d.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
b70b8408e05202ca446c93cea4dd33cd3c59e0a1fdd91e2d375087a93f6c5a3d.exe
-
Size
337KB
-
MD5
c15fc6aba1e5a7685ab6b8ac2c23fa06
-
SHA1
b26f7df2e13839c2ff43750b1d67390ffe5f6099
-
SHA256
b70b8408e05202ca446c93cea4dd33cd3c59e0a1fdd91e2d375087a93f6c5a3d
-
SHA512
2b7501b18cbc5c7e27a8a35e4889e8b60b838b339bbfa7580a7a96a23e1969a236838252784418266e755a7aa6c273ee027e6b136aa63c578dc788a9e669c371
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3740-118-0x0000000004DB0000-0x0000000004DCF000-memory.dmp family_redline behavioral1/memory/3740-120-0x0000000004F80000-0x0000000004F9D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3740-115-0x0000000004AF0000-0x0000000004B12000-memory.dmpFilesize
136KB
-
memory/3740-116-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3740-117-0x0000000004B20000-0x0000000004B50000-memory.dmpFilesize
192KB
-
memory/3740-118-0x0000000004DB0000-0x0000000004DCF000-memory.dmpFilesize
124KB
-
memory/3740-119-0x0000000007580000-0x0000000007581000-memory.dmpFilesize
4KB
-
memory/3740-120-0x0000000004F80000-0x0000000004F9D000-memory.dmpFilesize
116KB
-
memory/3740-121-0x0000000007A80000-0x0000000007A81000-memory.dmpFilesize
4KB
-
memory/3740-122-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/3740-123-0x0000000004F70000-0x0000000004F71000-memory.dmpFilesize
4KB
-
memory/3740-124-0x0000000004F72000-0x0000000004F73000-memory.dmpFilesize
4KB
-
memory/3740-125-0x0000000004F73000-0x0000000004F74000-memory.dmpFilesize
4KB
-
memory/3740-126-0x0000000008090000-0x0000000008091000-memory.dmpFilesize
4KB
-
memory/3740-127-0x00000000081A0000-0x00000000081A1000-memory.dmpFilesize
4KB
-
memory/3740-128-0x0000000004F74000-0x0000000004F76000-memory.dmpFilesize
8KB
-
memory/3740-129-0x0000000008200000-0x0000000008201000-memory.dmpFilesize
4KB