Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-10-2021 00:34
Static task
static1
Behavioral task
behavioral1
Sample
30879b5c4d5bd0d5a778bb32f5a27da5f72c70e996740b7df6bfa0b4340e2d4c.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
30879b5c4d5bd0d5a778bb32f5a27da5f72c70e996740b7df6bfa0b4340e2d4c.exe
-
Size
358KB
-
MD5
edfa979e4ad2c51e612ef32af36a6399
-
SHA1
6d483b70002eb3b803b7bc264baf9edcbc61eaad
-
SHA256
30879b5c4d5bd0d5a778bb32f5a27da5f72c70e996740b7df6bfa0b4340e2d4c
-
SHA512
0d03903bd087e4488d9674965a1a79b12f9760cb54fc019d572d84de9e08fee8d26d9aa454fa2066d52fb7810e4a6e515954f1b33bcccfca2d7def3e222c1394
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/872-118-0x00000000026E0000-0x00000000026FF000-memory.dmp family_redline behavioral1/memory/872-123-0x0000000002AA0000-0x0000000002ABD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/872-115-0x00000000009C1000-0x00000000009E4000-memory.dmpFilesize
140KB
-
memory/872-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/872-117-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/872-118-0x00000000026E0000-0x00000000026FF000-memory.dmpFilesize
124KB
-
memory/872-120-0x00000000051A2000-0x00000000051A3000-memory.dmpFilesize
4KB
-
memory/872-119-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/872-121-0x00000000051A3000-0x00000000051A4000-memory.dmpFilesize
4KB
-
memory/872-122-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/872-123-0x0000000002AA0000-0x0000000002ABD000-memory.dmpFilesize
116KB
-
memory/872-124-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/872-125-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/872-126-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/872-127-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/872-128-0x00000000051A4000-0x00000000051A6000-memory.dmpFilesize
8KB
-
memory/872-129-0x0000000005CC0000-0x0000000005CC1000-memory.dmpFilesize
4KB