Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 14:56
Static task
static1
Behavioral task
behavioral1
Sample
9a33020439a1fb6cbe652dd1550bc9b433b17aac061aeec603288947bc21f5c7.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
9a33020439a1fb6cbe652dd1550bc9b433b17aac061aeec603288947bc21f5c7.exe
-
Size
337KB
-
MD5
fdf9b1805037fefd6381e39eaca5ae1c
-
SHA1
98c452bb27913d82eb7c1e4c22cfd36e3bc699f5
-
SHA256
9a33020439a1fb6cbe652dd1550bc9b433b17aac061aeec603288947bc21f5c7
-
SHA512
a5a4ac1a901998b08bbb12c080d4f1f726b02d48d441db911b03b71952fb0e3130a309f4af60f6c4582f27d679c2d277dc26412b40240912af047e0426dcb206
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1336-119-0x00000000051D0000-0x00000000051EF000-memory.dmp family_redline behavioral1/memory/1336-121-0x0000000005250000-0x000000000526D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1336-116-0x0000000004C70000-0x0000000004CA0000-memory.dmpFilesize
192KB
-
memory/1336-115-0x00000000030C0000-0x00000000030E2000-memory.dmpFilesize
136KB
-
memory/1336-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/1336-118-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/1336-119-0x00000000051D0000-0x00000000051EF000-memory.dmpFilesize
124KB
-
memory/1336-120-0x00000000077D0000-0x00000000077D1000-memory.dmpFilesize
4KB
-
memory/1336-121-0x0000000005250000-0x000000000526D000-memory.dmpFilesize
116KB
-
memory/1336-122-0x00000000082E0000-0x00000000082E1000-memory.dmpFilesize
4KB
-
memory/1336-124-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/1336-125-0x0000000005423000-0x0000000005424000-memory.dmpFilesize
4KB
-
memory/1336-123-0x0000000005422000-0x0000000005423000-memory.dmpFilesize
4KB
-
memory/1336-126-0x0000000007CD0000-0x0000000007CD1000-memory.dmpFilesize
4KB
-
memory/1336-127-0x0000000005340000-0x0000000005341000-memory.dmpFilesize
4KB
-
memory/1336-128-0x0000000005424000-0x0000000005426000-memory.dmpFilesize
8KB
-
memory/1336-129-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB