Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 15:12
Static task
static1
Behavioral task
behavioral1
Sample
19dd0dfac84ab103ddffc852b40a2946df5ae810b999169a29dff9e8de200b73.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
19dd0dfac84ab103ddffc852b40a2946df5ae810b999169a29dff9e8de200b73.exe
-
Size
336KB
-
MD5
2bb224b04c065a9f21c98f13600bb4fd
-
SHA1
6b3102148e043ab16e182676c9c354cdf37ea23b
-
SHA256
19dd0dfac84ab103ddffc852b40a2946df5ae810b999169a29dff9e8de200b73
-
SHA512
1e432b10e2387284dbbf1ea400f5aadfb119aac143c7f9df96fcdcda74da611e7f83709b50def6a63a1b72c6f9d2f3aac7cee72713223cd4188112ef158aabe5
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3484-118-0x0000000004E70000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3484-120-0x0000000005040000-0x000000000505D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3484-115-0x0000000003030000-0x000000000317A000-memory.dmpFilesize
1.3MB
-
memory/3484-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3484-116-0x0000000004C80000-0x0000000004CB0000-memory.dmpFilesize
192KB
-
memory/3484-118-0x0000000004E70000-0x0000000004E8F000-memory.dmpFilesize
124KB
-
memory/3484-119-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB
-
memory/3484-120-0x0000000005040000-0x000000000505D000-memory.dmpFilesize
116KB
-
memory/3484-121-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/3484-122-0x0000000007692000-0x0000000007693000-memory.dmpFilesize
4KB
-
memory/3484-123-0x0000000007693000-0x0000000007694000-memory.dmpFilesize
4KB
-
memory/3484-124-0x0000000007BA0000-0x0000000007BA1000-memory.dmpFilesize
4KB
-
memory/3484-125-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/3484-126-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB
-
memory/3484-127-0x00000000082C0000-0x00000000082C1000-memory.dmpFilesize
4KB
-
memory/3484-128-0x0000000007694000-0x0000000007696000-memory.dmpFilesize
8KB
-
memory/3484-129-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB