Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 11:34
Static task
static1
Behavioral task
behavioral1
Sample
ac76e7e5f365f1b29f4d7df8381ccb946dc29053228451a66b34e7d4336de570.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
ac76e7e5f365f1b29f4d7df8381ccb946dc29053228451a66b34e7d4336de570.exe
-
Size
337KB
-
MD5
1b3dfe46a1fcf53d96979b98f88db50a
-
SHA1
46cefd8398c9f4e1c696b73738c1f8b2bd8afdc8
-
SHA256
ac76e7e5f365f1b29f4d7df8381ccb946dc29053228451a66b34e7d4336de570
-
SHA512
a9821bfc207717b5499e975b553021d6e5a156c4240d590648c1d51eef143f16771146602930a1318835ef07329775f2be770c7ef8e94a8a945bb52d979f0610
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3792-117-0x0000000004D80000-0x0000000004D9F000-memory.dmp family_redline behavioral1/memory/3792-119-0x00000000075C0000-0x00000000075DD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3792-116-0x00000000031C0000-0x00000000031F0000-memory.dmpFilesize
192KB
-
memory/3792-115-0x0000000003190000-0x00000000031B2000-memory.dmpFilesize
136KB
-
memory/3792-117-0x0000000004D80000-0x0000000004D9F000-memory.dmpFilesize
124KB
-
memory/3792-118-0x0000000007600000-0x0000000007601000-memory.dmpFilesize
4KB
-
memory/3792-119-0x00000000075C0000-0x00000000075DD000-memory.dmpFilesize
116KB
-
memory/3792-120-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/3792-121-0x0000000008180000-0x0000000008181000-memory.dmpFilesize
4KB
-
memory/3792-122-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB
-
memory/3792-123-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3792-124-0x00000000075F0000-0x00000000075F1000-memory.dmpFilesize
4KB
-
memory/3792-126-0x00000000075F3000-0x00000000075F4000-memory.dmpFilesize
4KB
-
memory/3792-125-0x00000000075F2000-0x00000000075F3000-memory.dmpFilesize
4KB
-
memory/3792-127-0x00000000075F4000-0x00000000075F6000-memory.dmpFilesize
8KB
-
memory/3792-128-0x00000000082C0000-0x00000000082C1000-memory.dmpFilesize
4KB
-
memory/3792-129-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB