Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23-10-2021 10:31
Static task
static1
Behavioral task
behavioral1
Sample
d9e85ddd53b624a1963258f8088263c308f06eaa7ce0f41581cd5fde747d4a3f.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
d9e85ddd53b624a1963258f8088263c308f06eaa7ce0f41581cd5fde747d4a3f.exe
-
Size
409KB
-
MD5
52770e583a222b88fdbf20fd592f2545
-
SHA1
e78a2e4bd96205293482bbfda467179ba5f6c055
-
SHA256
d9e85ddd53b624a1963258f8088263c308f06eaa7ce0f41581cd5fde747d4a3f
-
SHA512
788ac9ca00f0c6fbb8f34c4954999eb636afc37df3e4310fa440bacf96beeffec4f364e3e82d2ca66070ab0b33d7a69bbaa875ca84aacf155851e64a6f60caa2
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3168-119-0x0000000002B10000-0x0000000002B2F000-memory.dmp family_redline behavioral1/memory/3168-121-0x0000000004F00000-0x0000000004F1D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3168-115-0x0000000000B16000-0x0000000000B39000-memory.dmpFilesize
140KB
-
memory/3168-116-0x0000000000970000-0x00000000009A0000-memory.dmpFilesize
192KB
-
memory/3168-117-0x0000000000400000-0x0000000000896000-memory.dmpFilesize
4.6MB
-
memory/3168-118-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/3168-119-0x0000000002B10000-0x0000000002B2F000-memory.dmpFilesize
124KB
-
memory/3168-120-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/3168-121-0x0000000004F00000-0x0000000004F1D000-memory.dmpFilesize
116KB
-
memory/3168-122-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/3168-123-0x0000000005012000-0x0000000005013000-memory.dmpFilesize
4KB
-
memory/3168-124-0x0000000005013000-0x0000000005014000-memory.dmpFilesize
4KB
-
memory/3168-125-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/3168-126-0x0000000005B30000-0x0000000005B31000-memory.dmpFilesize
4KB
-
memory/3168-127-0x0000000005014000-0x0000000005016000-memory.dmpFilesize
8KB
-
memory/3168-128-0x0000000005C40000-0x0000000005C41000-memory.dmpFilesize
4KB
-
memory/3168-129-0x0000000005C90000-0x0000000005C91000-memory.dmpFilesize
4KB