Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 18:21
Static task
static1
Behavioral task
behavioral1
Sample
6c8184326ba145f874bdbf05e095efca59111d30f8b9e33699a43584f8d93f16.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
6c8184326ba145f874bdbf05e095efca59111d30f8b9e33699a43584f8d93f16.exe
-
Size
337KB
-
MD5
ca7d699e5b666674dd1fb8605221bcb1
-
SHA1
05888ddbb63daaeecd57746b3bf033f17dbe05e7
-
SHA256
6c8184326ba145f874bdbf05e095efca59111d30f8b9e33699a43584f8d93f16
-
SHA512
90e6568c5be47713858531ea35075c49cdbc7a66011620d48d2e43df4ae6b728800e06306dd77a725135dfd28cb30df3b97db68f4222381c377eec8dc0992be9
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3396-118-0x0000000004DD0000-0x0000000004DEF000-memory.dmp family_redline behavioral1/memory/3396-121-0x00000000050B0000-0x00000000050CD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3396-116-0x0000000004C80000-0x0000000004CB0000-memory.dmpFilesize
192KB
-
memory/3396-115-0x0000000002F20000-0x0000000002FCE000-memory.dmpFilesize
696KB
-
memory/3396-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3396-118-0x0000000004DD0000-0x0000000004DEF000-memory.dmpFilesize
124KB
-
memory/3396-119-0x00000000076D0000-0x00000000076D1000-memory.dmpFilesize
4KB
-
memory/3396-120-0x00000000076E0000-0x00000000076E1000-memory.dmpFilesize
4KB
-
memory/3396-121-0x00000000050B0000-0x00000000050CD000-memory.dmpFilesize
116KB
-
memory/3396-122-0x0000000007BE0000-0x0000000007BE1000-memory.dmpFilesize
4KB
-
memory/3396-123-0x00000000076D2000-0x00000000076D3000-memory.dmpFilesize
4KB
-
memory/3396-124-0x00000000076D3000-0x00000000076D4000-memory.dmpFilesize
4KB
-
memory/3396-125-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/3396-126-0x00000000081F0000-0x00000000081F1000-memory.dmpFilesize
4KB
-
memory/3396-127-0x00000000076D4000-0x00000000076D6000-memory.dmpFilesize
8KB
-
memory/3396-128-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/3396-129-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB