Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 19:41
Static task
static1
Behavioral task
behavioral1
Sample
952fc8268d1be2f791489ec4d8d287d125b19732f9ebba6ec46802a982d3b985.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
952fc8268d1be2f791489ec4d8d287d125b19732f9ebba6ec46802a982d3b985.exe
-
Size
336KB
-
MD5
070d82ea9b0d25f7d6e1f7993c87f58e
-
SHA1
6045f5e1bdf8ff9e1da9e1fe2b1f19b1f567ceca
-
SHA256
952fc8268d1be2f791489ec4d8d287d125b19732f9ebba6ec46802a982d3b985
-
SHA512
e9848393f6fdd50a3c4b026c311ce6e49f3629728a5b487f9e4e635fdc4c983f659de27be7fe046f75e4b57d7e1be17d29889133d9c6acddc7772b1d332c3ea7
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3564-118-0x0000000004C90000-0x0000000004CAF000-memory.dmp family_redline behavioral1/memory/3564-120-0x0000000004F00000-0x0000000004F1D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3564-116-0x0000000002F70000-0x000000000301E000-memory.dmpFilesize
696KB
-
memory/3564-115-0x0000000002F70000-0x000000000301E000-memory.dmpFilesize
696KB
-
memory/3564-117-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/3564-118-0x0000000004C90000-0x0000000004CAF000-memory.dmpFilesize
124KB
-
memory/3564-119-0x00000000077A0000-0x00000000077A1000-memory.dmpFilesize
4KB
-
memory/3564-120-0x0000000004F00000-0x0000000004F1D000-memory.dmpFilesize
116KB
-
memory/3564-121-0x0000000007CA0000-0x0000000007CA1000-memory.dmpFilesize
4KB
-
memory/3564-122-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/3564-123-0x00000000075B0000-0x00000000075B1000-memory.dmpFilesize
4KB
-
memory/3564-124-0x0000000007790000-0x0000000007791000-memory.dmpFilesize
4KB
-
memory/3564-126-0x0000000007793000-0x0000000007794000-memory.dmpFilesize
4KB
-
memory/3564-125-0x0000000007792000-0x0000000007793000-memory.dmpFilesize
4KB
-
memory/3564-127-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/3564-128-0x0000000007794000-0x0000000007796000-memory.dmpFilesize
8KB
-
memory/3564-129-0x00000000076E0000-0x00000000076E1000-memory.dmpFilesize
4KB