Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-10-2021 01:30
Static task
static1
Behavioral task
behavioral1
Sample
86281dad28f2f1bf70a42ad2667f5b15807b9d4fbf678f0a8722df130bc58cb9.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
86281dad28f2f1bf70a42ad2667f5b15807b9d4fbf678f0a8722df130bc58cb9.exe
-
Size
358KB
-
MD5
3dc753b36137f215f17eb5323b5853f5
-
SHA1
65bc3faee92598e4a20d7d980990ed276b4c9086
-
SHA256
86281dad28f2f1bf70a42ad2667f5b15807b9d4fbf678f0a8722df130bc58cb9
-
SHA512
6a2ea6f99aa1999cfd399d0689dfe7ffb5652614ff698fdc52102bde60f66959bcc376ab4d8197422203e569becd7f5ec9e93a2f549b18df5711911bb591eff3
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UTS
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4364-120-0x0000000000D30000-0x0000000000D4F000-memory.dmp family_redline behavioral1/memory/4364-122-0x00000000027D0000-0x00000000027ED000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4364-116-0x0000000000AA1000-0x0000000000AC4000-memory.dmpFilesize
140KB
-
memory/4364-117-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/4364-118-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/4364-119-0x0000000005120000-0x0000000005121000-memory.dmpFilesize
4KB
-
memory/4364-120-0x0000000000D30000-0x0000000000D4F000-memory.dmpFilesize
124KB
-
memory/4364-121-0x0000000005130000-0x0000000005131000-memory.dmpFilesize
4KB
-
memory/4364-122-0x00000000027D0000-0x00000000027ED000-memory.dmpFilesize
116KB
-
memory/4364-123-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/4364-125-0x0000000005123000-0x0000000005124000-memory.dmpFilesize
4KB
-
memory/4364-124-0x0000000005122000-0x0000000005123000-memory.dmpFilesize
4KB
-
memory/4364-126-0x0000000002C50000-0x0000000002C51000-memory.dmpFilesize
4KB
-
memory/4364-127-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/4364-128-0x0000000005124000-0x0000000005126000-memory.dmpFilesize
8KB
-
memory/4364-129-0x0000000005C40000-0x0000000005C41000-memory.dmpFilesize
4KB
-
memory/4364-130-0x0000000005C80000-0x0000000005C81000-memory.dmpFilesize
4KB