Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 16:31
Static task
static1
Behavioral task
behavioral1
Sample
91ce28971551a26461d2ba15a9402cfd6cb4c7326ea4b8d2298ee5ee196602f1.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
91ce28971551a26461d2ba15a9402cfd6cb4c7326ea4b8d2298ee5ee196602f1.exe
-
Size
336KB
-
MD5
3a99d3fd7188a804ce3c3cdcf24dbc2b
-
SHA1
12b53532fb6879b00e44a876216ca4ffe95a2900
-
SHA256
91ce28971551a26461d2ba15a9402cfd6cb4c7326ea4b8d2298ee5ee196602f1
-
SHA512
8bc874d1b160a681c6c35d57255272d4b035876a560191d3054b44750f86362f2f894f507cde8234d9e134f0c54ebaaf28c36686785fa75c45a91eb62613d184
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/788-118-0x0000000004C60000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/788-120-0x00000000075B0000-0x00000000075CD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/788-116-0x0000000004B50000-0x0000000004B80000-memory.dmpFilesize
192KB
-
memory/788-115-0x0000000004B20000-0x0000000004B42000-memory.dmpFilesize
136KB
-
memory/788-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/788-118-0x0000000004C60000-0x0000000004C7F000-memory.dmpFilesize
124KB
-
memory/788-119-0x00000000076F0000-0x00000000076F1000-memory.dmpFilesize
4KB
-
memory/788-120-0x00000000075B0000-0x00000000075CD000-memory.dmpFilesize
116KB
-
memory/788-121-0x0000000007BF0000-0x0000000007BF1000-memory.dmpFilesize
4KB
-
memory/788-122-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/788-123-0x0000000008200000-0x0000000008201000-memory.dmpFilesize
4KB
-
memory/788-125-0x00000000076E2000-0x00000000076E3000-memory.dmpFilesize
4KB
-
memory/788-124-0x00000000076E0000-0x00000000076E1000-memory.dmpFilesize
4KB
-
memory/788-126-0x00000000076E3000-0x00000000076E4000-memory.dmpFilesize
4KB
-
memory/788-127-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/788-128-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB
-
memory/788-129-0x00000000076E4000-0x00000000076E6000-memory.dmpFilesize
8KB