Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    21-10-2021 09:43

General

  • Target

    6D5963A1884A660D607DA209501D7F68.exe

  • Size

    292KB

  • MD5

    6d5963a1884a660d607da209501d7f68

  • SHA1

    68e6ff766a224612dfdc7b063556f9ea5ddd0034

  • SHA256

    68b45507916d51d48ad761ff18117177db17ef3bbe17a4c1eb426240677af849

  • SHA512

    5306053d6960890c29940cd3277e03d645b10db359c0078ae429a78f8a32816c5dc63cc5d6ae4f46e37d005786a2826ccbe01c95d3d80db8f34969194bc91efe

Malware Config

Extracted

Family

redline

Botnet

1309

C2

95.217.77.23:53845

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6D5963A1884A660D607DA209501D7F68.exe
    "C:\Users\Admin\AppData\Local\Temp\6D5963A1884A660D607DA209501D7F68.exe"
    1⤵
      PID:1360

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1360-54-0x00000000021FB000-0x000000000221E000-memory.dmp
      Filesize

      140KB

    • memory/1360-56-0x0000000000400000-0x0000000002167000-memory.dmp
      Filesize

      29.4MB

    • memory/1360-55-0x00000000002B0000-0x00000000002E0000-memory.dmp
      Filesize

      192KB

    • memory/1360-57-0x0000000002180000-0x000000000219F000-memory.dmp
      Filesize

      124KB

    • memory/1360-58-0x0000000003BB0000-0x0000000003BCE000-memory.dmp
      Filesize

      120KB

    • memory/1360-59-0x00000000065C1000-0x00000000065C2000-memory.dmp
      Filesize

      4KB

    • memory/1360-60-0x00000000065C2000-0x00000000065C3000-memory.dmp
      Filesize

      4KB

    • memory/1360-61-0x00000000065C3000-0x00000000065C4000-memory.dmp
      Filesize

      4KB

    • memory/1360-62-0x00000000065C4000-0x00000000065C6000-memory.dmp
      Filesize

      8KB