Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-10-2021 00:12
Static task
static1
Behavioral task
behavioral1
Sample
ddd51db3249ee754f8d37fa41d552a2f5cd8af25e1be1536f2fabb03b00bb4c3.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
ddd51db3249ee754f8d37fa41d552a2f5cd8af25e1be1536f2fabb03b00bb4c3.exe
-
Size
358KB
-
MD5
8beb5a4345b8bad36b58963b0549b127
-
SHA1
6c7bd99e898a91e8590991225ea0d98b184be4d6
-
SHA256
ddd51db3249ee754f8d37fa41d552a2f5cd8af25e1be1536f2fabb03b00bb4c3
-
SHA512
b2b410daefd96d30723f8c35df626a98c355b3227cdf66bf0feae796fdadaf19b33a1537f69c86932df2fc109b1bf882b8466f4ce163ccb0f392d8d526f8185c
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2332-118-0x0000000002690000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2332-122-0x0000000002890000-0x00000000028AD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2332-115-0x0000000000B41000-0x0000000000B64000-memory.dmpFilesize
140KB
-
memory/2332-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/2332-117-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/2332-118-0x0000000002690000-0x00000000026AF000-memory.dmpFilesize
124KB
-
memory/2332-119-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/2332-120-0x00000000051E2000-0x00000000051E3000-memory.dmpFilesize
4KB
-
memory/2332-121-0x00000000051F0000-0x00000000051F1000-memory.dmpFilesize
4KB
-
memory/2332-122-0x0000000002890000-0x00000000028AD000-memory.dmpFilesize
116KB
-
memory/2332-123-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/2332-124-0x0000000002C50000-0x0000000002C51000-memory.dmpFilesize
4KB
-
memory/2332-125-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/2332-126-0x00000000051E3000-0x00000000051E4000-memory.dmpFilesize
4KB
-
memory/2332-127-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/2332-128-0x00000000051E4000-0x00000000051E6000-memory.dmpFilesize
8KB
-
memory/2332-129-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB