Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-10-2021 12:30
Static task
static1
Behavioral task
behavioral1
Sample
0d4661b289ff360a5f892b4e592b8f9f36997630e8143c6784f3479c9c7efbc5.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
0d4661b289ff360a5f892b4e592b8f9f36997630e8143c6784f3479c9c7efbc5.exe
-
Size
445KB
-
MD5
b6c1bd20ed0d07ea21b6fe4f459b97c4
-
SHA1
8c2c3382f8ca4cd3f6fbc8a6f33602b87d0301e7
-
SHA256
0d4661b289ff360a5f892b4e592b8f9f36997630e8143c6784f3479c9c7efbc5
-
SHA512
17bac23c0957b4229b044a681c4814891c2d421a4c94224d3177685800d2c2529bdad59792c2deb1a6d17eb12b81b7e2a05e976ef46d2a8bf9a785c95884901e
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
paladin
C2
188.68.201.6:10085
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3020-118-0x0000000000F90000-0x0000000000FBF000-memory.dmp family_redline behavioral1/memory/3020-122-0x0000000002C00000-0x0000000002C2E000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3020-115-0x0000000000C36000-0x0000000000C60000-memory.dmpFilesize
168KB
-
memory/3020-116-0x0000000000E20000-0x0000000000E64000-memory.dmpFilesize
272KB
-
memory/3020-117-0x0000000000400000-0x000000000089E000-memory.dmpFilesize
4.6MB
-
memory/3020-118-0x0000000000F90000-0x0000000000FBF000-memory.dmpFilesize
188KB
-
memory/3020-119-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/3020-120-0x0000000005192000-0x0000000005193000-memory.dmpFilesize
4KB
-
memory/3020-121-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/3020-122-0x0000000002C00000-0x0000000002C2E000-memory.dmpFilesize
184KB
-
memory/3020-123-0x00000000056A0000-0x00000000056A1000-memory.dmpFilesize
4KB
-
memory/3020-124-0x0000000002CA0000-0x0000000002CA1000-memory.dmpFilesize
4KB
-
memory/3020-125-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/3020-126-0x0000000005193000-0x0000000005194000-memory.dmpFilesize
4KB
-
memory/3020-127-0x0000000005130000-0x0000000005131000-memory.dmpFilesize
4KB
-
memory/3020-128-0x0000000005194000-0x0000000005196000-memory.dmpFilesize
8KB
-
memory/3020-129-0x0000000005CD0000-0x0000000005CD1000-memory.dmpFilesize
4KB