Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 22:40
Static task
static1
Behavioral task
behavioral1
Sample
80f0468dacb1f6c6d095c61c26cd88cc675a61240282b271fb898bd78080a41b.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
80f0468dacb1f6c6d095c61c26cd88cc675a61240282b271fb898bd78080a41b.exe
-
Size
408KB
-
MD5
00cdb4ffa831a82cbc6f25df68ce1eee
-
SHA1
c6a0084725a456a70585bcf0c784c683b58cf9a5
-
SHA256
80f0468dacb1f6c6d095c61c26cd88cc675a61240282b271fb898bd78080a41b
-
SHA512
2306759e0abc041514284ebc4d80e03380f2b8db7b9f1b5a77cf2ac4e8c8d4d6bcfaddaa762afd330e2532427120630cbdb3da73c0c546dd28121b39a4b02316
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2780-116-0x0000000002620000-0x000000000263F000-memory.dmp family_redline behavioral1/memory/2780-118-0x0000000002AB0000-0x0000000002ACD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2780-116-0x0000000002620000-0x000000000263F000-memory.dmpFilesize
124KB
-
memory/2780-117-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/2780-118-0x0000000002AB0000-0x0000000002ACD000-memory.dmpFilesize
116KB
-
memory/2780-119-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/2780-120-0x0000000000D00000-0x0000000000D30000-memory.dmpFilesize
192KB
-
memory/2780-121-0x0000000000400000-0x0000000000895000-memory.dmpFilesize
4.6MB
-
memory/2780-122-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/2780-123-0x0000000005012000-0x0000000005013000-memory.dmpFilesize
4KB
-
memory/2780-124-0x0000000005013000-0x0000000005014000-memory.dmpFilesize
4KB
-
memory/2780-125-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/2780-126-0x0000000005B30000-0x0000000005B31000-memory.dmpFilesize
4KB
-
memory/2780-127-0x0000000005C40000-0x0000000005C41000-memory.dmpFilesize
4KB
-
memory/2780-128-0x0000000005C90000-0x0000000005C91000-memory.dmpFilesize
4KB
-
memory/2780-129-0x0000000005014000-0x0000000005016000-memory.dmpFilesize
8KB