Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23-10-2021 04:52
Static task
static1
Behavioral task
behavioral1
Sample
3bf9ec48f490c6a9a0010b8b47444d4cb5b384248c5719717093bcfe9d1c1070.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
3bf9ec48f490c6a9a0010b8b47444d4cb5b384248c5719717093bcfe9d1c1070.exe
-
Size
407KB
-
MD5
0ba3e7762d24b760e347ebd18b9e48d9
-
SHA1
b8288ca2feffc1b0d0504393c01b032c79dd5cc6
-
SHA256
3bf9ec48f490c6a9a0010b8b47444d4cb5b384248c5719717093bcfe9d1c1070
-
SHA512
3f42fe3503e3347fd52dd4d31029383b4ee42d29f05c21a58655f914046d4cfe484b1ba7e12c9effd558ae59c0409b1f26e3a0d6b1852a52a98e75a2a5da796d
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3504-118-0x0000000000E40000-0x0000000000E5F000-memory.dmp family_redline behavioral1/memory/3504-123-0x0000000002750000-0x000000000276D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3504-116-0x0000000000CF0000-0x0000000000D20000-memory.dmpFilesize
192KB
-
memory/3504-117-0x0000000000400000-0x0000000000895000-memory.dmpFilesize
4.6MB
-
memory/3504-118-0x0000000000E40000-0x0000000000E5F000-memory.dmpFilesize
124KB
-
memory/3504-120-0x0000000005072000-0x0000000005073000-memory.dmpFilesize
4KB
-
memory/3504-119-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/3504-121-0x0000000005073000-0x0000000005074000-memory.dmpFilesize
4KB
-
memory/3504-122-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/3504-123-0x0000000002750000-0x000000000276D000-memory.dmpFilesize
116KB
-
memory/3504-124-0x0000000005580000-0x0000000005581000-memory.dmpFilesize
4KB
-
memory/3504-125-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/3504-126-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/3504-127-0x0000000005074000-0x0000000005076000-memory.dmpFilesize
8KB
-
memory/3504-128-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/3504-129-0x0000000005B90000-0x0000000005B91000-memory.dmpFilesize
4KB