59e33e622b5d4c911cc9435bee18ca61c186eab28968e3e159f9e7e8fcd2db78

General
Target

59e33e622b5d4c911cc9435bee18ca61c186eab28968e3e159f9e7e8fcd2db78.exe

Filesize

337KB

Completed

21-10-2021 14:04

Score
10/10
MD5

f6a94227ccad040bdd055084c33511b1

SHA1

01e7b6ad03839481590ba74fefb3319a270a8976

SHA256

59e33e622b5d4c911cc9435bee18ca61c186eab28968e3e159f9e7e8fcd2db78

Malware Config

Extracted

Family redline
Botnet UDP
C2

45.9.20.182:52236

Signatures 2

Filter: none

  • RedLine

    Description

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload

    Reported IOCs

    resourceyara_rule
    behavioral1/memory/3496-115-0x0000000004CA0000-0x0000000004CBF000-memory.dmpfamily_redline
    behavioral1/memory/3496-117-0x0000000004D70000-0x0000000004D8D000-memory.dmpfamily_redline
Processes 1
  • C:\Users\Admin\AppData\Local\Temp\59e33e622b5d4c911cc9435bee18ca61c186eab28968e3e159f9e7e8fcd2db78.exe
    "C:\Users\Admin\AppData\Local\Temp\59e33e622b5d4c911cc9435bee18ca61c186eab28968e3e159f9e7e8fcd2db78.exe"
    PID:3496
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/3496-115-0x0000000004CA0000-0x0000000004CBF000-memory.dmp

                          • memory/3496-116-0x0000000007610000-0x0000000007611000-memory.dmp

                          • memory/3496-117-0x0000000004D70000-0x0000000004D8D000-memory.dmp

                          • memory/3496-118-0x0000000007B10000-0x0000000007B11000-memory.dmp

                          • memory/3496-119-0x0000000002F20000-0x000000000306A000-memory.dmp

                          • memory/3496-121-0x0000000000400000-0x0000000002F1B000-memory.dmp

                          • memory/3496-120-0x0000000004B40000-0x0000000004B70000-memory.dmp

                          • memory/3496-122-0x0000000004F30000-0x0000000004F31000-memory.dmp

                          • memory/3496-123-0x0000000007600000-0x0000000007601000-memory.dmp

                          • memory/3496-125-0x0000000008120000-0x0000000008121000-memory.dmp

                          • memory/3496-126-0x0000000007603000-0x0000000007604000-memory.dmp

                          • memory/3496-124-0x0000000007602000-0x0000000007603000-memory.dmp

                          • memory/3496-127-0x0000000007550000-0x0000000007551000-memory.dmp

                          • memory/3496-128-0x0000000007604000-0x0000000007606000-memory.dmp

                          • memory/3496-129-0x0000000008230000-0x0000000008231000-memory.dmp