Analysis
-
max time kernel
134s -
max time network
157s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-10-2021 10:00
Static task
static1
Behavioral task
behavioral1
Sample
a0f227e1e23efdb8174a8dcd6aeba6aaf1aa51b2c4a8d327b32af3d433d35407.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
a0f227e1e23efdb8174a8dcd6aeba6aaf1aa51b2c4a8d327b32af3d433d35407.exe
-
Size
410KB
-
MD5
a073b7a2e6a318476d56fc48075bbaa4
-
SHA1
f56f0e6067a4b4c9925345564863b9f706cdb9b1
-
SHA256
a0f227e1e23efdb8174a8dcd6aeba6aaf1aa51b2c4a8d327b32af3d433d35407
-
SHA512
b67a7564851a9445bfc8ce84baeb5777c5b85cb61af59503ab2e4417838b1efa7dba2f74c20527d8b115e66977332f6d18549f095781c0ca5c4c494ef13d46b0
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3800-117-0x0000000002E80000-0x0000000002E9F000-memory.dmp family_redline behavioral1/memory/3800-119-0x0000000002FD0000-0x0000000002FED000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3800-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/3800-117-0x0000000002E80000-0x0000000002E9F000-memory.dmpFilesize
124KB
-
memory/3800-118-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/3800-119-0x0000000002FD0000-0x0000000002FED000-memory.dmpFilesize
116KB
-
memory/3800-120-0x0000000005C10000-0x0000000005C11000-memory.dmpFilesize
4KB
-
memory/3800-121-0x00000000031A0000-0x00000000031A1000-memory.dmpFilesize
4KB
-
memory/3800-122-0x0000000006220000-0x0000000006221000-memory.dmpFilesize
4KB
-
memory/3800-123-0x0000000003310000-0x0000000003311000-memory.dmpFilesize
4KB
-
memory/3800-124-0x0000000000400000-0x0000000001037000-memory.dmpFilesize
12.2MB
-
memory/3800-125-0x0000000003390000-0x0000000003391000-memory.dmpFilesize
4KB
-
memory/3800-126-0x0000000003392000-0x0000000003393000-memory.dmpFilesize
4KB
-
memory/3800-127-0x0000000003393000-0x0000000003394000-memory.dmpFilesize
4KB
-
memory/3800-128-0x0000000003394000-0x0000000003396000-memory.dmpFilesize
8KB
-
memory/3800-129-0x0000000006330000-0x0000000006331000-memory.dmpFilesize
4KB