Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
24-10-2021 11:00
Static task
static1
Behavioral task
behavioral1
Sample
4e34d2c77b177a4435a263788bf1333e09f475a30e30cb9e040f462a8e9714a3.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
4e34d2c77b177a4435a263788bf1333e09f475a30e30cb9e040f462a8e9714a3.exe
-
Size
410KB
-
MD5
9ad13a5847e0964bb10965d07662b8b6
-
SHA1
7db66b42bb1b301a3376c7171b82318f82d2fa81
-
SHA256
4e34d2c77b177a4435a263788bf1333e09f475a30e30cb9e040f462a8e9714a3
-
SHA512
ce46555770a8f5a30ed3da118e607512baae4d3235ef6d59bce25151bd1bcefb8428bd252bf80ed8a077d40e1f80d18758a9dc0b27fb262171d0ddd782e48aca
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2824-118-0x0000000002D50000-0x0000000002D6F000-memory.dmp family_redline behavioral1/memory/2824-122-0x0000000003260000-0x000000000327D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2824-115-0x0000000001341000-0x0000000001364000-memory.dmpFilesize
140KB
-
memory/2824-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/2824-117-0x0000000000400000-0x0000000001037000-memory.dmpFilesize
12.2MB
-
memory/2824-118-0x0000000002D50000-0x0000000002D6F000-memory.dmpFilesize
124KB
-
memory/2824-119-0x00000000058E0000-0x00000000058E1000-memory.dmpFilesize
4KB
-
memory/2824-120-0x00000000058E2000-0x00000000058E3000-memory.dmpFilesize
4KB
-
memory/2824-121-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/2824-122-0x0000000003260000-0x000000000327D000-memory.dmpFilesize
116KB
-
memory/2824-123-0x0000000005DF0000-0x0000000005DF1000-memory.dmpFilesize
4KB
-
memory/2824-124-0x0000000003300000-0x0000000003301000-memory.dmpFilesize
4KB
-
memory/2824-125-0x00000000057A0000-0x00000000057A1000-memory.dmpFilesize
4KB
-
memory/2824-126-0x00000000058E3000-0x00000000058E4000-memory.dmpFilesize
4KB
-
memory/2824-127-0x0000000006440000-0x0000000006441000-memory.dmpFilesize
4KB
-
memory/2824-128-0x00000000058E4000-0x00000000058E6000-memory.dmpFilesize
8KB
-
memory/2824-129-0x0000000006480000-0x0000000006481000-memory.dmpFilesize
4KB