Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 01:30
Static task
static1
Behavioral task
behavioral1
Sample
01073af53aa56c8c964b26490753a5dc8d911bb91d0beb45d8af3e65cd19db12.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
01073af53aa56c8c964b26490753a5dc8d911bb91d0beb45d8af3e65cd19db12.exe
-
Size
385KB
-
MD5
656310821c1ebc7ca10ac41d5d620d37
-
SHA1
b771c1a54fcaa1eafa058aa0f9825705d0ce40f2
-
SHA256
01073af53aa56c8c964b26490753a5dc8d911bb91d0beb45d8af3e65cd19db12
-
SHA512
1cc15344533b79ce36098495ca7048fce841fa3e34b7c4183d1526b8b32947bd310933aef8b1c9a43e8ad1ed68ca7e5aa2176bec171fd08e2225df7d6f932d51
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
paladin
C2
188.68.201.6:10085
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3704-118-0x0000000002710000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3704-120-0x00000000027A0000-0x00000000027CE000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3704-116-0x0000000000890000-0x00000000008D4000-memory.dmpFilesize
272KB
-
memory/3704-117-0x0000000000400000-0x0000000000890000-memory.dmpFilesize
4.6MB
-
memory/3704-118-0x0000000002710000-0x000000000273F000-memory.dmpFilesize
188KB
-
memory/3704-119-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/3704-120-0x00000000027A0000-0x00000000027CE000-memory.dmpFilesize
184KB
-
memory/3704-121-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/3704-122-0x0000000002A70000-0x0000000002A71000-memory.dmpFilesize
4KB
-
memory/3704-123-0x0000000005D20000-0x0000000005D21000-memory.dmpFilesize
4KB
-
memory/3704-124-0x0000000002BB0000-0x0000000002BB1000-memory.dmpFilesize
4KB
-
memory/3704-125-0x0000000002D40000-0x0000000002D41000-memory.dmpFilesize
4KB
-
memory/3704-127-0x0000000005202000-0x0000000005203000-memory.dmpFilesize
4KB
-
memory/3704-126-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/3704-128-0x0000000005203000-0x0000000005204000-memory.dmpFilesize
4KB
-
memory/3704-129-0x0000000005204000-0x0000000005206000-memory.dmpFilesize
8KB