Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 23:20
Static task
static1
Behavioral task
behavioral1
Sample
5523613b1a1a8f00511b21378f8f5c900dae194bc14068f114d77b40ba67e87b.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
5523613b1a1a8f00511b21378f8f5c900dae194bc14068f114d77b40ba67e87b.exe
-
Size
408KB
-
MD5
c4d2428b65b2c198eee0b5489c4f8bad
-
SHA1
305d642d5e12e075780d235947b0c13bbaf040b5
-
SHA256
5523613b1a1a8f00511b21378f8f5c900dae194bc14068f114d77b40ba67e87b
-
SHA512
2c051e8e3d446bd3a7e533a8ece3b20035c15a608c190a7fa970bc694a5c4735cb27445dd58fbc25395f7e3207e12e2a3249ad0dd7595bf0e193555b36ea910a
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4324-118-0x0000000000F10000-0x0000000000F2F000-memory.dmp family_redline behavioral1/memory/4324-120-0x0000000002970000-0x000000000298D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4324-116-0x00000000008E0000-0x0000000000910000-memory.dmpFilesize
192KB
-
memory/4324-117-0x0000000000400000-0x0000000000895000-memory.dmpFilesize
4.6MB
-
memory/4324-118-0x0000000000F10000-0x0000000000F2F000-memory.dmpFilesize
124KB
-
memory/4324-119-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/4324-120-0x0000000002970000-0x000000000298D000-memory.dmpFilesize
116KB
-
memory/4324-121-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/4324-122-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/4324-123-0x0000000005A90000-0x0000000005A91000-memory.dmpFilesize
4KB
-
memory/4324-124-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/4324-125-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/4324-127-0x0000000004F72000-0x0000000004F73000-memory.dmpFilesize
4KB
-
memory/4324-128-0x0000000004F73000-0x0000000004F74000-memory.dmpFilesize
4KB
-
memory/4324-126-0x0000000004F70000-0x0000000004F71000-memory.dmpFilesize
4KB
-
memory/4324-129-0x0000000004F74000-0x0000000004F76000-memory.dmpFilesize
8KB