Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23-10-2021 11:11
Static task
static1
Behavioral task
behavioral1
Sample
1655f22e61a6482c902a0b8f19555519570c200aac2c65616b7f72ca6a49aaf0.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
1655f22e61a6482c902a0b8f19555519570c200aac2c65616b7f72ca6a49aaf0.exe
-
Size
408KB
-
MD5
8e23dd75ff678c1f00615e51427dd2ef
-
SHA1
fa09d40f1f3cf074beda22362b7d352cb63c3355
-
SHA256
1655f22e61a6482c902a0b8f19555519570c200aac2c65616b7f72ca6a49aaf0
-
SHA512
c425ecaab841b4035f8cef6ab3a2ede1771aa18a3f3c90a6816ec1ff7c7e0e5bfb481394d2c210df2c86607f73c3ded79e3d30018c384fb8a5fa55cc33820e9c
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3020-119-0x0000000002820000-0x000000000283F000-memory.dmp family_redline behavioral1/memory/3020-123-0x0000000004F00000-0x0000000004F1D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3020-116-0x00000000001D0000-0x0000000000200000-memory.dmpFilesize
192KB
-
memory/3020-117-0x0000000000400000-0x0000000000896000-memory.dmpFilesize
4.6MB
-
memory/3020-118-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/3020-119-0x0000000002820000-0x000000000283F000-memory.dmpFilesize
124KB
-
memory/3020-120-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/3020-122-0x0000000004FC3000-0x0000000004FC4000-memory.dmpFilesize
4KB
-
memory/3020-121-0x0000000004FC2000-0x0000000004FC3000-memory.dmpFilesize
4KB
-
memory/3020-123-0x0000000004F00000-0x0000000004F1D000-memory.dmpFilesize
116KB
-
memory/3020-124-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/3020-125-0x0000000005AE0000-0x0000000005AE1000-memory.dmpFilesize
4KB
-
memory/3020-126-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/3020-127-0x0000000005C10000-0x0000000005C11000-memory.dmpFilesize
4KB
-
memory/3020-128-0x0000000004FC4000-0x0000000004FC6000-memory.dmpFilesize
8KB
-
memory/3020-129-0x0000000005C90000-0x0000000005C91000-memory.dmpFilesize
4KB