Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    21-10-2021 14:31

General

  • Target

    8141f47537cd8ab12a9dba55300867d810d7a61d31c918fb778895d646b69e54.exe

  • Size

    337KB

  • MD5

    2fa0d2276feaf26be1c511cd717f88b2

  • SHA1

    112797eb9dd04c460ea2693fb37302a1eb6713f4

  • SHA256

    8141f47537cd8ab12a9dba55300867d810d7a61d31c918fb778895d646b69e54

  • SHA512

    687dcd5c3bf7d523ac2d032fe2377bf6c6d2edf7dbb9f04ba30f0ad5e87da5d7efa80e7761e7d27ade8307e862272b2ada0f5d0715097b0b0e1e20f0a419df6e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8141f47537cd8ab12a9dba55300867d810d7a61d31c918fb778895d646b69e54.exe
    "C:\Users\Admin\AppData\Local\Temp\8141f47537cd8ab12a9dba55300867d810d7a61d31c918fb778895d646b69e54.exe"
    1⤵
      PID:3540

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3540-116-0x00000000030A0000-0x00000000030D0000-memory.dmp
      Filesize

      192KB

    • memory/3540-115-0x0000000003070000-0x0000000003092000-memory.dmp
      Filesize

      136KB

    • memory/3540-117-0x0000000000400000-0x0000000002F1B000-memory.dmp
      Filesize

      43.1MB

    • memory/3540-118-0x0000000004F80000-0x0000000004F9F000-memory.dmp
      Filesize

      124KB

    • memory/3540-119-0x0000000004FA0000-0x0000000004FA1000-memory.dmp
      Filesize

      4KB

    • memory/3540-120-0x0000000004FA2000-0x0000000004FA3000-memory.dmp
      Filesize

      4KB

    • memory/3540-121-0x0000000007460000-0x0000000007461000-memory.dmp
      Filesize

      4KB

    • memory/3540-122-0x0000000007980000-0x000000000799D000-memory.dmp
      Filesize

      116KB

    • memory/3540-123-0x00000000079A0000-0x00000000079A1000-memory.dmp
      Filesize

      4KB

    • memory/3540-124-0x0000000004FA3000-0x0000000004FA4000-memory.dmp
      Filesize

      4KB

    • memory/3540-125-0x0000000008040000-0x0000000008041000-memory.dmp
      Filesize

      4KB

    • memory/3540-126-0x0000000008070000-0x0000000008071000-memory.dmp
      Filesize

      4KB

    • memory/3540-127-0x0000000008180000-0x0000000008181000-memory.dmp
      Filesize

      4KB

    • memory/3540-128-0x0000000004FA4000-0x0000000004FA6000-memory.dmp
      Filesize

      8KB

    • memory/3540-129-0x0000000008200000-0x0000000008201000-memory.dmp
      Filesize

      4KB