Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-10-2021 06:20
Static task
static1
Behavioral task
behavioral1
Sample
46971537f058e5e4c712d0d2c8670d7cd993204330939498b5d37931e2859172.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
46971537f058e5e4c712d0d2c8670d7cd993204330939498b5d37931e2859172.exe
-
Size
412KB
-
MD5
68160b0a200b600df9a91f56d45979e3
-
SHA1
04ee7960c708a1cc6320d3ec83a2801aadf89c44
-
SHA256
46971537f058e5e4c712d0d2c8670d7cd993204330939498b5d37931e2859172
-
SHA512
09cf38aacaf6f877d7ce6871d58c9cb4998d37f81ee436360fbf080cd14ee2296f41fe6d7f2b0e6b2401883a3de69dfa73f04aea70726f5236d38920087b4e85
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4088-116-0x0000000000BB0000-0x0000000000BCF000-memory.dmp family_redline behavioral1/memory/4088-123-0x0000000002660000-0x000000000267D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4088-116-0x0000000000BB0000-0x0000000000BCF000-memory.dmpFilesize
124KB
-
memory/4088-117-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/4088-118-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/4088-119-0x0000000000400000-0x0000000000896000-memory.dmpFilesize
4.6MB
-
memory/4088-121-0x00000000050B2000-0x00000000050B3000-memory.dmpFilesize
4KB
-
memory/4088-120-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/4088-122-0x00000000050B3000-0x00000000050B4000-memory.dmpFilesize
4KB
-
memory/4088-123-0x0000000002660000-0x000000000267D000-memory.dmpFilesize
116KB
-
memory/4088-124-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/4088-125-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/4088-126-0x0000000004EC0000-0x0000000004EC1000-memory.dmpFilesize
4KB
-
memory/4088-127-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/4088-128-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/4088-129-0x00000000050B4000-0x00000000050B6000-memory.dmpFilesize
8KB