Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 11:32
Static task
static1
Behavioral task
behavioral1
Sample
ba12385e43116ba49b336ae5c45a16700ccb09cb3cdc8e547d9ad9bbdb706fad.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
ba12385e43116ba49b336ae5c45a16700ccb09cb3cdc8e547d9ad9bbdb706fad.exe
-
Size
336KB
-
MD5
415bf5af22ff5f73f486197ca8ec1448
-
SHA1
f759c4ba635dde76bd259c0554e410bbe066afae
-
SHA256
ba12385e43116ba49b336ae5c45a16700ccb09cb3cdc8e547d9ad9bbdb706fad
-
SHA512
a12e89d95969e40194fd0e670ff1f0c55d9e1c785f993d6587fbf8eb237cc5897e1cc6e6ceadb17a1568a98782ca23ccc001f5b22f865318efe975c42578a7f2
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2696-118-0x0000000004D40000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/2696-121-0x0000000005040000-0x000000000505D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2696-115-0x0000000004C30000-0x0000000004C52000-memory.dmpFilesize
136KB
-
memory/2696-116-0x0000000004C60000-0x0000000004C90000-memory.dmpFilesize
192KB
-
memory/2696-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/2696-118-0x0000000004D40000-0x0000000004D5F000-memory.dmpFilesize
124KB
-
memory/2696-119-0x0000000007880000-0x0000000007881000-memory.dmpFilesize
4KB
-
memory/2696-120-0x0000000007890000-0x0000000007891000-memory.dmpFilesize
4KB
-
memory/2696-121-0x0000000005040000-0x000000000505D000-memory.dmpFilesize
116KB
-
memory/2696-122-0x0000000007D90000-0x0000000007D91000-memory.dmpFilesize
4KB
-
memory/2696-123-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/2696-124-0x0000000007882000-0x0000000007883000-memory.dmpFilesize
4KB
-
memory/2696-125-0x0000000007720000-0x0000000007721000-memory.dmpFilesize
4KB
-
memory/2696-126-0x0000000007883000-0x0000000007884000-memory.dmpFilesize
4KB
-
memory/2696-127-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/2696-128-0x0000000007884000-0x0000000007886000-memory.dmpFilesize
8KB
-
memory/2696-129-0x0000000007830000-0x0000000007831000-memory.dmpFilesize
4KB