Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23-10-2021 07:03
Static task
static1
Behavioral task
behavioral1
Sample
952c464b6864939f50277727e5726f5fc482a4715529bf16d74277807239db87.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
952c464b6864939f50277727e5726f5fc482a4715529bf16d74277807239db87.exe
-
Size
409KB
-
MD5
6fa373086a32d0229194dbef6936241c
-
SHA1
6e6c020c370b574dd0b9a6ba32e7dc475b40963c
-
SHA256
952c464b6864939f50277727e5726f5fc482a4715529bf16d74277807239db87
-
SHA512
9ab2a353142820fc9348bf69b421c81318f934ccad9ce450cb00fc6a8f46431a141492acef082b0d43771d7a2c08b679cafeebc641e0bfbff17e2d385565478d
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2776-119-0x0000000002620000-0x000000000263F000-memory.dmp family_redline behavioral1/memory/2776-123-0x0000000002980000-0x000000000299D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2776-116-0x00000000008A0000-0x00000000009EA000-memory.dmpFilesize
1.3MB
-
memory/2776-117-0x0000000000400000-0x0000000000895000-memory.dmpFilesize
4.6MB
-
memory/2776-118-0x0000000002650000-0x0000000002651000-memory.dmpFilesize
4KB
-
memory/2776-119-0x0000000002620000-0x000000000263F000-memory.dmpFilesize
124KB
-
memory/2776-120-0x0000000002652000-0x0000000002653000-memory.dmpFilesize
4KB
-
memory/2776-121-0x0000000002653000-0x0000000002654000-memory.dmpFilesize
4KB
-
memory/2776-122-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/2776-123-0x0000000002980000-0x000000000299D000-memory.dmpFilesize
116KB
-
memory/2776-124-0x00000000053A0000-0x00000000053A1000-memory.dmpFilesize
4KB
-
memory/2776-125-0x0000000002A30000-0x0000000002A31000-memory.dmpFilesize
4KB
-
memory/2776-126-0x00000000059C0000-0x00000000059C1000-memory.dmpFilesize
4KB
-
memory/2776-127-0x0000000005AD0000-0x0000000005AD1000-memory.dmpFilesize
4KB
-
memory/2776-128-0x0000000002654000-0x0000000002656000-memory.dmpFilesize
8KB
-
memory/2776-129-0x0000000005B50000-0x0000000005B51000-memory.dmpFilesize
4KB