Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
23-10-2021 01:00
Static task
static1
Behavioral task
behavioral1
Sample
07c01e60a38e6d23620a8bcb6455268bde918ca1bc475a63559a1b2e2ee9cb8b.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
07c01e60a38e6d23620a8bcb6455268bde918ca1bc475a63559a1b2e2ee9cb8b.exe
-
Size
407KB
-
MD5
63eb18a6c56b94417824082e8375e331
-
SHA1
0889d86e5406117d68c79ce3fbfc9a8d73c750c0
-
SHA256
07c01e60a38e6d23620a8bcb6455268bde918ca1bc475a63559a1b2e2ee9cb8b
-
SHA512
f7610b0c0857b54f5c5eacc35a2bf4b5939b177f9bdd3f487c68f23b9cc2c1b862eb77b4bd41232099b915dc9c6c77e6ca50c611978c877ec720a59894f5faf4
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4068-117-0x0000000002590000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4068-119-0x0000000004F00000-0x0000000004F1D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4068-115-0x0000000000A46000-0x0000000000A69000-memory.dmpFilesize
140KB
-
memory/4068-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/4068-117-0x0000000002590000-0x00000000025AF000-memory.dmpFilesize
124KB
-
memory/4068-118-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/4068-119-0x0000000004F00000-0x0000000004F1D000-memory.dmpFilesize
116KB
-
memory/4068-120-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/4068-121-0x0000000005AD0000-0x0000000005AD1000-memory.dmpFilesize
4KB
-
memory/4068-122-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/4068-124-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/4068-125-0x0000000004FA2000-0x0000000004FA3000-memory.dmpFilesize
4KB
-
memory/4068-123-0x0000000000400000-0x0000000000895000-memory.dmpFilesize
4.6MB
-
memory/4068-126-0x0000000004FA3000-0x0000000004FA4000-memory.dmpFilesize
4KB
-
memory/4068-127-0x0000000004FA4000-0x0000000004FA6000-memory.dmpFilesize
8KB
-
memory/4068-128-0x0000000005C10000-0x0000000005C11000-memory.dmpFilesize
4KB
-
memory/4068-129-0x0000000005C90000-0x0000000005C91000-memory.dmpFilesize
4KB