Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 12:01
Static task
static1
Behavioral task
behavioral1
Sample
aff16d142d729241b58fd1820821d66cea3a9e1f90e47b0c7770a90b53fea8fc.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
aff16d142d729241b58fd1820821d66cea3a9e1f90e47b0c7770a90b53fea8fc.exe
-
Size
337KB
-
MD5
64970c509fbcf29d81f219bae38c25c0
-
SHA1
976787ecdf0722c9f0f9f1ee3a3a1a4bf1eb7bdd
-
SHA256
aff16d142d729241b58fd1820821d66cea3a9e1f90e47b0c7770a90b53fea8fc
-
SHA512
f69e3b1cef0f38d474de1780d36ad64f2c9fe17221df33f4ffd9b27cfb251a721bf83238be945d6ba101e3f8a7304a8360f198d27da5489c38c88809cc79cdd0
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3488-119-0x0000000004BF0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3488-123-0x0000000004EB0000-0x0000000004ECD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3488-116-0x0000000003070000-0x00000000030A0000-memory.dmpFilesize
192KB
-
memory/3488-115-0x0000000002F20000-0x000000000306A000-memory.dmpFilesize
1.3MB
-
memory/3488-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3488-118-0x0000000007720000-0x0000000007721000-memory.dmpFilesize
4KB
-
memory/3488-119-0x0000000004BF0000-0x0000000004C0F000-memory.dmpFilesize
124KB
-
memory/3488-120-0x0000000007730000-0x0000000007731000-memory.dmpFilesize
4KB
-
memory/3488-121-0x0000000007722000-0x0000000007723000-memory.dmpFilesize
4KB
-
memory/3488-122-0x0000000007723000-0x0000000007724000-memory.dmpFilesize
4KB
-
memory/3488-123-0x0000000004EB0000-0x0000000004ECD000-memory.dmpFilesize
116KB
-
memory/3488-124-0x0000000007C30000-0x0000000007C31000-memory.dmpFilesize
4KB
-
memory/3488-125-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/3488-126-0x00000000075F0000-0x00000000075F1000-memory.dmpFilesize
4KB
-
memory/3488-127-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/3488-128-0x0000000007724000-0x0000000007726000-memory.dmpFilesize
8KB
-
memory/3488-129-0x0000000008240000-0x0000000008241000-memory.dmpFilesize
4KB