Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-10-2021 11:51
Static task
static1
Behavioral task
behavioral1
Sample
d32fbd7838bede71eb0affafdd0aef05e6d831b8fa32332b0f0cdb4f66545088.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
d32fbd7838bede71eb0affafdd0aef05e6d831b8fa32332b0f0cdb4f66545088.exe
-
Size
419KB
-
MD5
75e25a598c246597f6a0e755ac0d405b
-
SHA1
a7727dfb4e072cc2e891759ad91f7cd5ce4e9fbd
-
SHA256
d32fbd7838bede71eb0affafdd0aef05e6d831b8fa32332b0f0cdb4f66545088
-
SHA512
b7cbbbd153fce8c51c778236c1a95be742881736806f4706da48c833835c5071c614ff758d7125a070f99985e4b9cf5ddccb3f1a75a36c1c6e2a711808eb925c
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4368-118-0x0000000000EF0000-0x0000000000F0F000-memory.dmp family_redline behavioral1/memory/4368-120-0x00000000027C0000-0x00000000027DD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4368-115-0x0000000000C06000-0x0000000000C29000-memory.dmpFilesize
140KB
-
memory/4368-116-0x00000000008A0000-0x00000000009EA000-memory.dmpFilesize
1.3MB
-
memory/4368-117-0x0000000000400000-0x0000000000898000-memory.dmpFilesize
4.6MB
-
memory/4368-118-0x0000000000EF0000-0x0000000000F0F000-memory.dmpFilesize
124KB
-
memory/4368-119-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/4368-120-0x00000000027C0000-0x00000000027DD000-memory.dmpFilesize
116KB
-
memory/4368-121-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/4368-123-0x00000000051A2000-0x00000000051A3000-memory.dmpFilesize
4KB
-
memory/4368-122-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/4368-124-0x00000000051A3000-0x00000000051A4000-memory.dmpFilesize
4KB
-
memory/4368-125-0x0000000002B50000-0x0000000002B51000-memory.dmpFilesize
4KB
-
memory/4368-126-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/4368-127-0x00000000051A4000-0x00000000051A6000-memory.dmpFilesize
8KB
-
memory/4368-128-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/4368-129-0x0000000005CC0000-0x0000000005CC1000-memory.dmpFilesize
4KB