Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 15:13
Static task
static1
Behavioral task
behavioral1
Sample
3477e89e185a006b02dc9d832f5030cae0a207fa5b1b3476004fb5498cce4754.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
3477e89e185a006b02dc9d832f5030cae0a207fa5b1b3476004fb5498cce4754.exe
-
Size
337KB
-
MD5
bb8612d4a1a87600d08a550d7ac3fd5f
-
SHA1
32ae35e331fda80521bead4449493c326122db07
-
SHA256
3477e89e185a006b02dc9d832f5030cae0a207fa5b1b3476004fb5498cce4754
-
SHA512
5678dd193fbfefa188953f1f4e561330ca90061c7a4a998059abf7e4c63a5828cf642450fe52d729812281a636af3427fdc784cbc5dd8b9552d7d5d5b2145820
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4056-118-0x0000000004EA0000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/4056-121-0x0000000005070000-0x000000000508D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4056-115-0x0000000004C60000-0x0000000004C83000-memory.dmpFilesize
140KB
-
memory/4056-116-0x0000000004C90000-0x0000000004CC0000-memory.dmpFilesize
192KB
-
memory/4056-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/4056-118-0x0000000004EA0000-0x0000000004EBF000-memory.dmpFilesize
124KB
-
memory/4056-119-0x00000000076F0000-0x00000000076F1000-memory.dmpFilesize
4KB
-
memory/4056-120-0x0000000007700000-0x0000000007701000-memory.dmpFilesize
4KB
-
memory/4056-121-0x0000000005070000-0x000000000508D000-memory.dmpFilesize
116KB
-
memory/4056-122-0x0000000007C00000-0x0000000007C01000-memory.dmpFilesize
4KB
-
memory/4056-123-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/4056-125-0x00000000076F3000-0x00000000076F4000-memory.dmpFilesize
4KB
-
memory/4056-124-0x00000000076F2000-0x00000000076F3000-memory.dmpFilesize
4KB
-
memory/4056-126-0x0000000008210000-0x0000000008211000-memory.dmpFilesize
4KB
-
memory/4056-127-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/4056-128-0x00000000076F4000-0x00000000076F6000-memory.dmpFilesize
8KB
-
memory/4056-129-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB