Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 09:42
Static task
static1
Behavioral task
behavioral1
Sample
b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8.exe
-
Size
337KB
-
MD5
14c5bcb9841835b9f24070e3892138c5
-
SHA1
e0c65c81f06c1f0ba383a3e1794cc51cc4ed8b5c
-
SHA256
b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8
-
SHA512
9ab879fede3e0f82912ba2a748a08acb68aba4f113070549b51278e22d3c533f3def865daa4d6624d084913faa62f0b244b1f224439e213516bcc6909d7fbc2a
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2188-118-0x0000000004E00000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2188-123-0x0000000004FC0000-0x0000000004FDD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2188-115-0x0000000002FC0000-0x000000000310A000-memory.dmpFilesize
1.3MB
-
memory/2188-116-0x0000000004C60000-0x0000000004C90000-memory.dmpFilesize
192KB
-
memory/2188-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/2188-118-0x0000000004E00000-0x0000000004E1F000-memory.dmpFilesize
124KB
-
memory/2188-120-0x0000000007772000-0x0000000007773000-memory.dmpFilesize
4KB
-
memory/2188-119-0x0000000007770000-0x0000000007771000-memory.dmpFilesize
4KB
-
memory/2188-121-0x0000000007773000-0x0000000007774000-memory.dmpFilesize
4KB
-
memory/2188-122-0x0000000007780000-0x0000000007781000-memory.dmpFilesize
4KB
-
memory/2188-123-0x0000000004FC0000-0x0000000004FDD000-memory.dmpFilesize
116KB
-
memory/2188-124-0x0000000007C80000-0x0000000007C81000-memory.dmpFilesize
4KB
-
memory/2188-125-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/2188-126-0x0000000008290000-0x0000000008291000-memory.dmpFilesize
4KB
-
memory/2188-127-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/2188-128-0x0000000007774000-0x0000000007776000-memory.dmpFilesize
8KB
-
memory/2188-129-0x0000000007710000-0x0000000007711000-memory.dmpFilesize
4KB