7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36

General
Target

7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36.exe

Filesize

337KB

Completed

21-10-2021 13:23

Score
10/10
MD5

9aeec807c1190054c904edaa2b005f54

SHA1

404d1353266358ae8a219302253bc0b87db2eaf9

SHA256

7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36

Malware Config

Extracted

Family redline
Botnet UDP
C2

45.9.20.182:52236

Signatures 2

Filter: none

  • RedLine

    Description

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload

    Reported IOCs

    resourceyara_rule
    behavioral1/memory/3772-118-0x0000000007540000-0x000000000755F000-memory.dmpfamily_redline
    behavioral1/memory/3772-120-0x00000000075B0000-0x00000000075CD000-memory.dmpfamily_redline
Processes 1
  • C:\Users\Admin\AppData\Local\Temp\7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36.exe
    "C:\Users\Admin\AppData\Local\Temp\7f90f64ca873b4143f4d8b8383d0a95147e7a4cfe31f0a5606014c50d4dd7b36.exe"
    PID:3772
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/3772-115-0x0000000002F20000-0x0000000002FCE000-memory.dmp

                          • memory/3772-116-0x0000000004C70000-0x0000000004CA0000-memory.dmp

                          • memory/3772-117-0x0000000000400000-0x0000000002F1B000-memory.dmp

                          • memory/3772-118-0x0000000007540000-0x000000000755F000-memory.dmp

                          • memory/3772-119-0x0000000007730000-0x0000000007731000-memory.dmp

                          • memory/3772-120-0x00000000075B0000-0x00000000075CD000-memory.dmp

                          • memory/3772-121-0x0000000007720000-0x0000000007721000-memory.dmp

                          • memory/3772-122-0x0000000007722000-0x0000000007723000-memory.dmp

                          • memory/3772-123-0x0000000007723000-0x0000000007724000-memory.dmp

                          • memory/3772-124-0x0000000007C30000-0x0000000007C31000-memory.dmp

                          • memory/3772-125-0x0000000007660000-0x0000000007661000-memory.dmp

                          • memory/3772-126-0x0000000008240000-0x0000000008241000-memory.dmp

                          • memory/3772-127-0x0000000007690000-0x0000000007691000-memory.dmp

                          • memory/3772-128-0x0000000007724000-0x0000000007726000-memory.dmp

                          • memory/3772-129-0x0000000008350000-0x0000000008351000-memory.dmp