Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 14:31
Static task
static1
Behavioral task
behavioral1
Sample
8141f47537cd8ab12a9dba55300867d810d7a61d31c918fb778895d646b69e54.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
8141f47537cd8ab12a9dba55300867d810d7a61d31c918fb778895d646b69e54.exe
-
Size
337KB
-
MD5
2fa0d2276feaf26be1c511cd717f88b2
-
SHA1
112797eb9dd04c460ea2693fb37302a1eb6713f4
-
SHA256
8141f47537cd8ab12a9dba55300867d810d7a61d31c918fb778895d646b69e54
-
SHA512
687dcd5c3bf7d523ac2d032fe2377bf6c6d2edf7dbb9f04ba30f0ad5e87da5d7efa80e7761e7d27ade8307e862272b2ada0f5d0715097b0b0e1e20f0a419df6e
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3540-118-0x0000000004F80000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/3540-122-0x0000000007980000-0x000000000799D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3540-116-0x00000000030A0000-0x00000000030D0000-memory.dmpFilesize
192KB
-
memory/3540-115-0x0000000003070000-0x0000000003092000-memory.dmpFilesize
136KB
-
memory/3540-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3540-118-0x0000000004F80000-0x0000000004F9F000-memory.dmpFilesize
124KB
-
memory/3540-119-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/3540-120-0x0000000004FA2000-0x0000000004FA3000-memory.dmpFilesize
4KB
-
memory/3540-121-0x0000000007460000-0x0000000007461000-memory.dmpFilesize
4KB
-
memory/3540-122-0x0000000007980000-0x000000000799D000-memory.dmpFilesize
116KB
-
memory/3540-123-0x00000000079A0000-0x00000000079A1000-memory.dmpFilesize
4KB
-
memory/3540-124-0x0000000004FA3000-0x0000000004FA4000-memory.dmpFilesize
4KB
-
memory/3540-125-0x0000000008040000-0x0000000008041000-memory.dmpFilesize
4KB
-
memory/3540-126-0x0000000008070000-0x0000000008071000-memory.dmpFilesize
4KB
-
memory/3540-127-0x0000000008180000-0x0000000008181000-memory.dmpFilesize
4KB
-
memory/3540-128-0x0000000004FA4000-0x0000000004FA6000-memory.dmpFilesize
8KB
-
memory/3540-129-0x0000000008200000-0x0000000008201000-memory.dmpFilesize
4KB