Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 13:20
Static task
static1
Behavioral task
behavioral1
Sample
7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36.exe
-
Size
337KB
-
MD5
9aeec807c1190054c904edaa2b005f54
-
SHA1
404d1353266358ae8a219302253bc0b87db2eaf9
-
SHA256
7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36
-
SHA512
effa7880fb64fa932a4bcbe5ce1f1a62ea2331599cda3e8fd5fcda0d3e749e8baf24a603ccb9d7c8dd4f2dfa30b6897d50cd7000716c72627e168c83fbb9f77d
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3772-118-0x0000000007540000-0x000000000755F000-memory.dmp family_redline behavioral1/memory/3772-120-0x00000000075B0000-0x00000000075CD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3772-115-0x0000000002F20000-0x0000000002FCE000-memory.dmpFilesize
696KB
-
memory/3772-116-0x0000000004C70000-0x0000000004CA0000-memory.dmpFilesize
192KB
-
memory/3772-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3772-118-0x0000000007540000-0x000000000755F000-memory.dmpFilesize
124KB
-
memory/3772-119-0x0000000007730000-0x0000000007731000-memory.dmpFilesize
4KB
-
memory/3772-120-0x00000000075B0000-0x00000000075CD000-memory.dmpFilesize
116KB
-
memory/3772-121-0x0000000007720000-0x0000000007721000-memory.dmpFilesize
4KB
-
memory/3772-122-0x0000000007722000-0x0000000007723000-memory.dmpFilesize
4KB
-
memory/3772-123-0x0000000007723000-0x0000000007724000-memory.dmpFilesize
4KB
-
memory/3772-124-0x0000000007C30000-0x0000000007C31000-memory.dmpFilesize
4KB
-
memory/3772-125-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/3772-126-0x0000000008240000-0x0000000008241000-memory.dmpFilesize
4KB
-
memory/3772-127-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/3772-128-0x0000000007724000-0x0000000007726000-memory.dmpFilesize
8KB
-
memory/3772-129-0x0000000008350000-0x0000000008351000-memory.dmpFilesize
4KB