Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23-10-2021 04:45
Static task
static1
Behavioral task
behavioral1
Sample
d6854bc333a548aab0025755682667b13027dbb6c0310ffc8d8ea12d0922e46c.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
d6854bc333a548aab0025755682667b13027dbb6c0310ffc8d8ea12d0922e46c.exe
-
Size
407KB
-
MD5
36dbd51343eadffca3bfc71980e67aa5
-
SHA1
1d751b7b143c706efdb8721370e958d575a5ee25
-
SHA256
d6854bc333a548aab0025755682667b13027dbb6c0310ffc8d8ea12d0922e46c
-
SHA512
4c707c33299452cb2c59f61485283155146cc2c9df91deec4d27a8dde4dbc1f273dc74ce5350de83b24ae73a913a1e9cc6056c00f9814969140e32fd0d0e21b1
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3380-119-0x0000000000DE0000-0x0000000000DFF000-memory.dmp family_redline behavioral1/memory/3380-122-0x00000000028F0000-0x000000000290D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3380-115-0x0000000000AA6000-0x0000000000AC9000-memory.dmpFilesize
140KB
-
memory/3380-116-0x00000000008E0000-0x0000000000910000-memory.dmpFilesize
192KB
-
memory/3380-117-0x0000000000400000-0x0000000000895000-memory.dmpFilesize
4.6MB
-
memory/3380-118-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/3380-119-0x0000000000DE0000-0x0000000000DFF000-memory.dmpFilesize
124KB
-
memory/3380-120-0x00000000050B2000-0x00000000050B3000-memory.dmpFilesize
4KB
-
memory/3380-121-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/3380-122-0x00000000028F0000-0x000000000290D000-memory.dmpFilesize
116KB
-
memory/3380-123-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/3380-124-0x00000000050B3000-0x00000000050B4000-memory.dmpFilesize
4KB
-
memory/3380-125-0x00000000029B0000-0x00000000029B1000-memory.dmpFilesize
4KB
-
memory/3380-126-0x0000000005BD0000-0x0000000005BD1000-memory.dmpFilesize
4KB
-
memory/3380-127-0x00000000050B4000-0x00000000050B6000-memory.dmpFilesize
8KB
-
memory/3380-128-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/3380-129-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB