Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 15:11
Static task
static1
Behavioral task
behavioral1
Sample
0cee0abd2df5431a3d76fa4a8a7af8aacc81289ba1ce5f9efe5c278705ec4064.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
0cee0abd2df5431a3d76fa4a8a7af8aacc81289ba1ce5f9efe5c278705ec4064.exe
-
Size
337KB
-
MD5
921f2f14b65bd0feddf009a87a4693c1
-
SHA1
b5cc72c20216dcd95c554af2c6327595a4012f8d
-
SHA256
0cee0abd2df5431a3d76fa4a8a7af8aacc81289ba1ce5f9efe5c278705ec4064
-
SHA512
832a88967be2b19c34e292e83d317bdc6d5dd9173fb670cd5ffe125cc91d3f7950d45d261dd97b9082cf82c4012e159bd45be91db3029b738005d9f67c53aa00
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2784-115-0x0000000004CA0000-0x0000000004CBF000-memory.dmp family_redline behavioral1/memory/2784-121-0x00000000075B0000-0x00000000075CD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2784-115-0x0000000004CA0000-0x0000000004CBF000-memory.dmpFilesize
124KB
-
memory/2784-117-0x00000000030B0000-0x00000000030E0000-memory.dmpFilesize
192KB
-
memory/2784-118-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/2784-116-0x0000000003080000-0x00000000030A2000-memory.dmpFilesize
136KB
-
memory/2784-119-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/2784-120-0x0000000007670000-0x0000000007671000-memory.dmpFilesize
4KB
-
memory/2784-121-0x00000000075B0000-0x00000000075CD000-memory.dmpFilesize
116KB
-
memory/2784-122-0x0000000007B70000-0x0000000007B71000-memory.dmpFilesize
4KB
-
memory/2784-123-0x0000000008180000-0x0000000008181000-memory.dmpFilesize
4KB
-
memory/2784-125-0x0000000007663000-0x0000000007664000-memory.dmpFilesize
4KB
-
memory/2784-124-0x0000000007662000-0x0000000007663000-memory.dmpFilesize
4KB
-
memory/2784-126-0x00000000081B0000-0x00000000081B1000-memory.dmpFilesize
4KB
-
memory/2784-127-0x00000000082C0000-0x00000000082C1000-memory.dmpFilesize
4KB
-
memory/2784-128-0x0000000007664000-0x0000000007666000-memory.dmpFilesize
8KB
-
memory/2784-129-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB