Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 07:33
Static task
static1
Behavioral task
behavioral1
Sample
8aa17ab0a058b2956c0548f542f5be96b6320845887891f7b2879ca1b02307b2.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
8aa17ab0a058b2956c0548f542f5be96b6320845887891f7b2879ca1b02307b2.exe
-
Size
359KB
-
MD5
f679e156161a00549731b49d2de1fb0a
-
SHA1
f66b93ea530340f76b3a8e9e1eb1acf3fc0cea98
-
SHA256
8aa17ab0a058b2956c0548f542f5be96b6320845887891f7b2879ca1b02307b2
-
SHA512
3e248ea99c633c3370081f953ec3e2d4c865ba9b4a093319922192f0c48e32e686780d2335d9b4b8127c96c5733ce0dd0e0bec1867484b8b1a9bbd40f37f8761
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3364-116-0x00000000027D0000-0x00000000027EF000-memory.dmp family_redline behavioral1/memory/3364-122-0x0000000002990000-0x00000000029AD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3364-115-0x0000000000A86000-0x0000000000AA9000-memory.dmpFilesize
140KB
-
memory/3364-116-0x00000000027D0000-0x00000000027EF000-memory.dmpFilesize
124KB
-
memory/3364-117-0x00000000009E0000-0x0000000000A10000-memory.dmpFilesize
192KB
-
memory/3364-118-0x0000000000400000-0x0000000000889000-memory.dmpFilesize
4.5MB
-
memory/3364-119-0x0000000002D30000-0x0000000002D31000-memory.dmpFilesize
4KB
-
memory/3364-120-0x0000000002D32000-0x0000000002D33000-memory.dmpFilesize
4KB
-
memory/3364-121-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/3364-122-0x0000000002990000-0x00000000029AD000-memory.dmpFilesize
116KB
-
memory/3364-123-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/3364-124-0x0000000002B40000-0x0000000002B41000-memory.dmpFilesize
4KB
-
memory/3364-125-0x0000000005BD0000-0x0000000005BD1000-memory.dmpFilesize
4KB
-
memory/3364-126-0x0000000002C90000-0x0000000002C91000-memory.dmpFilesize
4KB
-
memory/3364-127-0x0000000005CE0000-0x0000000005CE1000-memory.dmpFilesize
4KB
-
memory/3364-129-0x0000000002D34000-0x0000000002D36000-memory.dmpFilesize
8KB
-
memory/3364-128-0x0000000002D33000-0x0000000002D34000-memory.dmpFilesize
4KB