Analysis
-
max time kernel
121s -
max time network
165s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 18:45
Static task
static1
Behavioral task
behavioral1
Sample
d08c7505d9deda3037398a2bddec6e49.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
d08c7505d9deda3037398a2bddec6e49.exe
Resource
win10-en-20210920
General
-
Target
d08c7505d9deda3037398a2bddec6e49.exe
-
Size
452KB
-
MD5
d08c7505d9deda3037398a2bddec6e49
-
SHA1
c35417022f575351d7b634aaa297d2e456887a7f
-
SHA256
8840d8c54b58cc29c57916919906a81fff6bca7bede7c6d5b08a363359ff3582
-
SHA512
94e88d77a383f657233d3777dcb313cd23f10d4042aa3472c92c0082a706098235f29722e2262a4f3e7ec48cdaa796558d611ba8607340208aa1296162280e9e
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3460-120-0x0000000002800000-0x000000000282D000-memory.dmp family_redline behavioral2/memory/3460-122-0x0000000004E00000-0x0000000004E2B000-memory.dmp family_redline -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3460-119-0x0000000000D10000-0x0000000000D54000-memory.dmpFilesize
272KB
-
memory/3460-120-0x0000000002800000-0x000000000282D000-memory.dmpFilesize
180KB
-
memory/3460-121-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/3460-122-0x0000000004E00000-0x0000000004E2B000-memory.dmpFilesize
172KB
-
memory/3460-123-0x0000000005390000-0x0000000005391000-memory.dmpFilesize
4KB
-
memory/3460-125-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/3460-124-0x0000000000400000-0x00000000008A0000-memory.dmpFilesize
4.6MB
-
memory/3460-126-0x0000000004E82000-0x0000000004E83000-memory.dmpFilesize
4KB
-
memory/3460-127-0x0000000004E83000-0x0000000004E84000-memory.dmpFilesize
4KB
-
memory/3460-128-0x00000000059D0000-0x00000000059D1000-memory.dmpFilesize
4KB
-
memory/3460-129-0x0000000005A00000-0x0000000005A01000-memory.dmpFilesize
4KB
-
memory/3460-130-0x0000000005B10000-0x0000000005B11000-memory.dmpFilesize
4KB
-
memory/3460-131-0x0000000004E84000-0x0000000004E86000-memory.dmpFilesize
8KB
-
memory/3460-132-0x0000000005B90000-0x0000000005B91000-memory.dmpFilesize
4KB
-
memory/3460-133-0x0000000005E20000-0x0000000005E21000-memory.dmpFilesize
4KB
-
memory/3460-134-0x0000000006530000-0x0000000006531000-memory.dmpFilesize
4KB
-
memory/3460-135-0x00000000065B0000-0x00000000065B1000-memory.dmpFilesize
4KB
-
memory/3460-136-0x0000000006650000-0x0000000006651000-memory.dmpFilesize
4KB